General

  • Target

    a497fa3c146438d3434ea2a7b957643c_JaffaCakes118

  • Size

    19.7MB

  • MD5

    a497fa3c146438d3434ea2a7b957643c

  • SHA1

    b1030b09cc380a64bf9d94947b04d91296e7f1f1

  • SHA256

    0131bd800e1d5324fb7f9f7c5bf07627dac318c5d852df15a51b48fb11d68f24

  • SHA512

    24246d03f183f51d618eef8a4f124c067daf0ad38e447c3939fb92fd50122883f019a6d3959fca3b998b8a6802ef7867e04bcc73abad82342692c534b464bf2c

  • SSDEEP

    393216:rBs72oV5iNHPzIfE/CLw0QUehz0rd3jPBgd8WEendB4sMmr2vTdjCYx88zoImez:VQ2o4HeE/ogUeurg1dGLaCpi8zo2

Score
6/10

Malware Config

Signatures

  • Requests dangerous framework permissions 1 IoCs

Files

  • a497fa3c146438d3434ea2a7b957643c_JaffaCakes118
    .apk android arch:arm64 arch:arm

    com.crescentmoongames.blocky_roads

    com.crescentmoongames.blocky_roads.ExpansionDownloaderActivity


Android Permissions

a497fa3c146438d3434ea2a7b957643c_JaffaCakes118

Permissions

android.permission.INTERNET

android.permission.WAKE_LOCK

android.permission.ACCESS_NETWORK_STATE

android.permission.WRITE_EXTERNAL_STORAGE

com.android.vending.CHECK_LICENSE

android.permission.ACCESS_WIFI_STATE

android.permission.VIBRATE

com.android.vending.BILLING