General

  • Target

    f77e3b87e7825111a588ad2d630202e343d064bdf37f9bb9a28db4e7f907dd24

  • Size

    11.7MB

  • MD5

    e33c0e9a3649c92f49251da8913eed30

  • SHA1

    6a6faf4d6c46383efa86f3990bdef41dab15dabe

  • SHA256

    f77e3b87e7825111a588ad2d630202e343d064bdf37f9bb9a28db4e7f907dd24

  • SHA512

    bf431c26db7bc634eb8eab5d6a3245429835615cd6755f2f6345ef04e05da0e4331ac22ff991e3484f972919da44161ccf9ca7be8f15a9b8bb7e8ac5574744fb

  • SSDEEP

    196608:wMhUzmea8l23c2Sp3dUN9yI/TXlDwAgp+UXYrNir23pk923:G2SCbTXlcD9YrNir2CY

Score
6/10

Malware Config

Signatures

  • Requests dangerous framework permissions 1 IoCs

Files

  • f77e3b87e7825111a588ad2d630202e343d064bdf37f9bb9a28db4e7f907dd24
    .apk android arch:arm

    com.kingsbounty.turnbased.strategy.td

    com.ansca.corona.CoronaActivity


Android Permissions

f77e3b87e7825111a588ad2d630202e343d064bdf37f9bb9a28db4e7f907dd24

Permissions

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.INTERNET

com.android.vending.CHECK_LICENSE

android.permission.ACCESS_NETWORK_STATE