General

  • Target

    b0f9adec11bd62bbf883ef83c0004641d2daf474c9346f8a957d5d3e55a9cfe4

  • Size

    11.2MB

  • MD5

    eb86c6cd368c5eaf69748d017c9f258c

  • SHA1

    38fe3b7c4abd10321c75d4f2782a75a8bb0abfd6

  • SHA256

    b0f9adec11bd62bbf883ef83c0004641d2daf474c9346f8a957d5d3e55a9cfe4

  • SHA512

    952e2aef8e14b7990dd97f1b3586f4821ca0b3bc139799f5de17cfa10d85e73529f7fe1c69514e6aca9278975f8a26f0d25165636658923b4f4777a6f5426bf3

  • SSDEEP

    196608:B9WwrG1D00icNUJiEs8SJMi6Ocr8vwvzioLx/O3dIdCAxiBpXi+ZuJoGKMSKZFJb:/5y1NiUqiJni1oIrioV/rdPOpXia+oaR

Score
8/10
upx

Malware Config

Signatures

  • Patched UPX-packed file 1 IoCs

    Sample is packed with UPX but required header fields are zeroed out to prevent unpacking with the default UPX tool.

  • Requests dangerous framework permissions 4 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • b0f9adec11bd62bbf883ef83c0004641d2daf474c9346f8a957d5d3e55a9cfe4
    .zip
  • 秒看电视 7.8.3去广告版.apk
    .apk android arch:arm

    com.qy.kktv

    com.qy.kktv.PlayerMainActivity


  • channel.html
    .html .js
  • cmey
  • config.json
  • global.xiri
  • info.json
  • lua.droid
  • wifi.html
    .html .js