General

  • Target

    4c5cee7164eef366aa5e0f0977d97970

  • Size

    28.0MB

  • MD5

    4c5cee7164eef366aa5e0f0977d97970

  • SHA1

    5b573d47d3921fb87a04754afcad2a4302eeaba7

  • SHA256

    698f1b105109ebbdfdcd01b838b23cd548c61ebb6a09e53c493a4fc214cf7708

  • SHA512

    daa5c4030cf4cf01399d8c629ef6b9735ccc36446b2ac981caf60d24de555a731a5b319a05e78209fbfc8e3724129301f87229ae88f6c75524472ff7c6414661

  • SSDEEP

    786432:TOajvrG+3VcE8ywYARPxr/PKkOaOt40CDCiR5:aajD13CEFARPxr/PKkGI5

Score
8/10
upx

Malware Config

Signatures

  • Patched UPX-packed file 3 IoCs

    Sample is packed with UPX but required header fields are zeroed out to prevent unpacking with the default UPX tool.

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Requests dangerous framework permissions 6 IoCs

Files

  • 4c5cee7164eef366aa5e0f0977d97970
    .apk android arch:arm64 arch:arm arch:mips arch:mips64 arch:x86 arch:x64

    com.bohhom.rbsn.equipment.shop

    com.bohhom.vem.activity.BootActivity


  • amap_resource1_0_0.png
    .apk android

    com.example.amapsdkv2


Android Permissions

4c5cee7164eef366aa5e0f0977d97970

Permissions

android.permission.READ_LOGS

android.permission.INTERNET

android.permission.ACCESS_NETWORK_STATE

android.permission.ACCESS_WIFI_STATE

android.permission.CAMERA

android.permission.VIBRATE

android.permission.FLASHLIGHT

android.permission.MOUNT_UNMOUNT_FILESYSTEMS

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.READ_EXTERNAL_STORAGE

android.permission.ACCESS_COARSE_LOCATION

android.permission.ACCESS_FINE_LOCATION

android.permission.CALL_PHONE

android.permission.CHANGE_WIFI_STATE