General

  • Target

    bbd14d4f2bf296bf1f9e17ed55aec9cf

  • Size

    18.1MB

  • MD5

    bbd14d4f2bf296bf1f9e17ed55aec9cf

  • SHA1

    c776f4197556f3163fe9c09275578703c73ef7de

  • SHA256

    a99ec8a321ca2270f4f58a0b6448cf4dcde8639888dc5884adb5546afbb5df92

  • SHA512

    ce7ae089ca1513d10442ac0a60a274f10a49bf2a69b85d795ee8c60f3c6642b61265316f27533221a9f7cc777a3e57a8b5868300309e70dddc9d30a94e8b747a

  • SSDEEP

    393216:/IFRazHiTNjBsog3lXCyg8fZjxH8s4+rbwkovJAF1YkRVqD83NH1Uxp9:AFYCTRBsn1XzBxH8s/BoR2SkR8D8ep9

Score
6/10

Malware Config

Signatures

  • Requests dangerous framework permissions 3 IoCs

Files

  • bbd14d4f2bf296bf1f9e17ed55aec9cf
    .apk android arch:arm

    com.appear.RoussianRoulleteLite

    com.aiwu.Splash


Android Permissions

bbd14d4f2bf296bf1f9e17ed55aec9cf

Permissions

android.permission.INTERNET

android.permission.ACCESS_NETWORK_STATE

android.permission.ACCESS_WIFI_STATE

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.READ_EXTERNAL_STORAGE

android.permission.READ_PHONE_STATE

com.android.vending.BILLING