General

  • Target

    6e13c34e5eeda97459a6846a01bb2cb7039c9e0edaddcf2b6a2ecba46dbdb06c

  • Size

    8.5MB

  • MD5

    2f3e71ca7fc42b49a6da68a7710951c1

  • SHA1

    ad8aa8eccb384bca5f516f30bde3bb1e2bab7b15

  • SHA256

    6e13c34e5eeda97459a6846a01bb2cb7039c9e0edaddcf2b6a2ecba46dbdb06c

  • SHA512

    da50deb805b191abaf565eca3e9864a8b591d36f00dd723613865197399ecdca7d5603c2ca6a7bb6d02a7bf6f19330e7d4372e9477f428c35b9b467f672ad1dd

  • SSDEEP

    196608:4kKmqBopLJv8NHveO66X3edU5QnDxSQ5CZioBuuZJlCiNZ5:DKmqaLtuPeY3edU5QnDMQe/zlZT

Score
8/10
upx

Malware Config

Signatures

  • Patched UPX-packed file 1 IoCs

    Sample is packed with UPX but required header fields are zeroed out to prevent unpacking with the default UPX tool.

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Requests dangerous framework permissions 4 IoCs

Files

  • 6e13c34e5eeda97459a6846a01bb2cb7039c9e0edaddcf2b6a2ecba46dbdb06c
    .apk android arch:arm

    com.jmchn.typhoon

    com.jmchn.typhoon.WelcomeActivity


  • amap_resource1_0_0.png
    .apk android

    com.example.amapsdkv2

    com.amap.api.maps.offlinemap.OfflineMapActivity


  • gdtadv2.jar
    .apk android

Android Permissions

6e13c34e5eeda97459a6846a01bb2cb7039c9e0edaddcf2b6a2ecba46dbdb06c

Permissions

android.permission.INTERNET

android.permission.ACCESS_NETWORK_STATE

android.permission.READ_PHONE_STATE

android.permission.WRITE_SETTINGS

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.ACCESS_COARSE_LOCATION

android.permission.ACCESS_WIFI_STATE