General

  • Target

    c4b9ee6994bc92e5e1c0ac3b013bafe822de45b2b3804b59e5253432e721c831

  • Size

    26.7MB

  • MD5

    299bcb5bb339a26ce82ce5747df890d9

  • SHA1

    5f6e5b2eb431271b1d09eb308b0fe7d0d9af32c0

  • SHA256

    c4b9ee6994bc92e5e1c0ac3b013bafe822de45b2b3804b59e5253432e721c831

  • SHA512

    c8d52c509d3d8a97f535d1018a88ea479de68c96c0f0616c4adfeb12a2496a98fa0aff56863c7d15f93b822ed12184216680bccabcd311878c77243b760dbaa8

  • SSDEEP

    393216:pAHEkCQ8zgw7H50nLNxfn+oie9V+Pyv6j7wizKLgXSBLbu86QB8Is6bWhNB17qsh:p68Q47Z0Zx+BejudjchvkGjMBccGGt

Score
6/10

Malware Config

Signatures

  • Requests dangerous framework permissions 1 IoCs

Files

  • c4b9ee6994bc92e5e1c0ac3b013bafe822de45b2b3804b59e5253432e721c831
    .apk android

    com.loveXL.rts

    com.corrodinggames.rts.appFramework.IntroScreen


Android Permissions

c4b9ee6994bc92e5e1c0ac3b013bafe822de45b2b3804b59e5253432e721c831

Permissions

android.permission.INTERNET

android.permission.ACCESS_WIFI_STATE

android.permission.WRITE_EXTERNAL_STORAGE

com.android.vending.CHECK_LICENSE