General

  • Target

    ff84118c5dfa5725af8ad9a6b7964439af08c18f7afa101c6e14634c072d0e79

  • Size

    12.9MB

  • MD5

    99ebb6b7c9615a0b19e94ca3b80b74e7

  • SHA1

    96f470d9fd34df1193eb2403a44b2c24ff1b35ab

  • SHA256

    ff84118c5dfa5725af8ad9a6b7964439af08c18f7afa101c6e14634c072d0e79

  • SHA512

    5231238fa1752e9119336b071a539c5deeea65e17d5b82c0165ecec00793a26fef6cbb90a022c6d4646c2653f95f2725fe7ed5b86be5c2857e6ec14bfd01a523

  • SSDEEP

    393216:lKaM1Fn5DV8yorWU8EgmDaaYllhgPEy31cn:ghn5DVPoreEgWaaYllQ3Sn

Score
6/10

Malware Config

Signatures

  • Requests dangerous framework permissions 2 IoCs

Files

  • ff84118c5dfa5725af8ad9a6b7964439af08c18f7afa101c6e14634c072d0e79
    .apk android arch:arm

    com.freshcandymatch.xueliligame

    org.cocos2dx.cpp.AppActivity


Android Permissions

ff84118c5dfa5725af8ad9a6b7964439af08c18f7afa101c6e14634c072d0e79

Permissions

android.permission.READ_LOGS

android.permission.INTERNET

android.permission.ACCESS_NETWORK_STATE

android.permission.ACCESS_WIFI_STATE

android.permission.READ_PHONE_STATE

android.permission.WRITE_EXTERNAL_STORAGE