General

  • Target

    7f49c3215e9af9d260f546323462ac63

  • Size

    20.2MB

  • MD5

    7f49c3215e9af9d260f546323462ac63

  • SHA1

    2d67c98cbbd4fa92bfa4fa10b5934b2149f60c1c

  • SHA256

    3f3a7529384b418ec7d31b0d8b7717509eed30e9fe7823ff89ac022ddf930dd8

  • SHA512

    654d52c017bdd5858f98dc92eeb7335e4addd8875193f3bc38c023223b576a290caa77df8a990957a026d09330a85d1abc4695f0fe349e3f3de8342fe83d67f2

  • SSDEEP

    393216:6vWn51oe7TmXz4qvLD40mhhppLmoJsjC4Pla4k0b/xM3MED0QlerActVa:6vW5n7Kj4ko1h7pFsDaum8EwQ0cctVa

Score
6/10

Malware Config

Signatures

  • Requests dangerous framework permissions 2 IoCs

Files

  • 7f49c3215e9af9d260f546323462ac63
    .apk android arch:arm arch:x86

    net.solargames.dungeonexplorer2

    net.agasper.immersivemodeplugin.ImmersiveActivity


Android Permissions

7f49c3215e9af9d260f546323462ac63

Permissions

com.android.vending.BILLING

android.permission.ACCESS_NETWORK_STATE

android.permission.INTERNET

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.READ_PHONE_STATE

android.permission.ACCESS_WIFI_STATE

com.android.vending.CHECK_LICENSE