General

  • Target

    dfbb4523f44e924eb21650776e03d5ae312d311bb970b7244fd9fccb5dece765

  • Size

    20.4MB

  • MD5

    b66f4976b5e6c2730ed5fded5d0ded0a

  • SHA1

    7cb5fe76a5c54878b92f0415abbef3acdba9a26f

  • SHA256

    dfbb4523f44e924eb21650776e03d5ae312d311bb970b7244fd9fccb5dece765

  • SHA512

    eba066b2ff0982e1aba1eed4cfed5dcb28c1afac0c3c40bf439e1d3c0eca1da2ec9e2ead99d884f9bd94ef332fb500848fc9786417f75de99f4a5165720dc77a

  • SSDEEP

    393216:55s3yCBD5QWW+O8iuU4AThcrb1i9sxmY1x3wmae06QZqspMCLqFVRNi:55s37DZde4QwR0VYD3/puLW3a

Score
6/10

Malware Config

Signatures

  • Requests dangerous framework permissions 2 IoCs

Files

  • dfbb4523f44e924eb21650776e03d5ae312d311bb970b7244fd9fccb5dece765
    .apk android arch:arm

    com.toy.defense.free

    org.cocos2dx.cpp.AppActivity


  • __xadsdk__remote__final__.jar
    .apk android
  • gdtadv2.jar
    .apk android

Android Permissions

dfbb4523f44e924eb21650776e03d5ae312d311bb970b7244fd9fccb5dece765

Permissions

android.permission.INTERNET

android.permission.ACCESS_NETWORK_STATE

android.permission.ACCESS_WIFI_STATE

android.permission.READ_PHONE_STATE

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.GET_TASKS

com.android.vending.BILLING