General

  • Target

    710B4750F21820EBA30B3158C8902796D2DC45CA792E6C7BA6358F6157C30A3C.apk

  • Size

    37.1MB

  • MD5

    52c40746f406dadf8c3096a11c42ca0e

  • SHA1

    4276a2b9510e8d09c4cbfbd8fdcfb3412eb04ccd

  • SHA256

    710b4750f21820eba30b3158c8902796d2dc45ca792e6c7ba6358f6157c30a3c

  • SHA512

    c596cf3db565de4ab8a10e74663c1225556142a7b34a2f9b312b778911b86fd3908cb34a0cd6218d61342bda281e1ef1ffd744e81a8f874abd9c52b9351f00f4

  • SSDEEP

    786432:WoyO0sa7RZTZB798yFNX7HpK0YEcybNCbqQE2V8uI8Y8sgXQfFG9:WxCa7p8yFp7sWcWNRQElX8xvUFG9

Score
6/10

Malware Config

Signatures

  • Requests dangerous framework permissions 1 IoCs

Files

  • 710B4750F21820EBA30B3158C8902796D2DC45CA792E6C7BA6358F6157C30A3C.apk
    .apk android arch:arm64 arch:arm

    com.tamalaki.hogblackstonemysteries

    com.tamalaki.hogblackstonemysteries.MainActivity


  • __xadsdk__remote__final__.jar
    .apk android

Android Permissions

710B4750F21820EBA30B3158C8902796D2DC45CA792E6C7BA6358F6157C30A3C.apk

Permissions

android.permission.INTERNET

android.permission.READ_PHONE_STATE

android.permission.ACCESS_NETWORK_STATE

com.android.vending.BILLING