General

  • Target

    8c3f538eb2f93c13e4a23018db0d96010ec80282c73c79c5007a0e0969a9c215

  • Size

    21.8MB

  • MD5

    ccdc59c634084a00b514079b6e02b8a5

  • SHA1

    2a451bc75886724e52f113ce8a577fcc163e89a4

  • SHA256

    8c3f538eb2f93c13e4a23018db0d96010ec80282c73c79c5007a0e0969a9c215

  • SHA512

    5b301c9ef4abd1cb04e8af25f323bba3142fc4c30548810ff1828d6f4d9573d7669bd2faea09a68c4c2eaaa1d9b59957b8745b6b2f2eb33075ca2d1d4f759e0f

  • SSDEEP

    393216:9KmqaL7QICL2FK3aM63mtTa+eWnPNI46m9I46m+MUFZL8hkvxUU3at6dVNdKymC:9OaXlAsIv63qT/P247m47+TF1vxUf6Ln

Score
8/10
upx

Malware Config

Signatures

  • Patched UPX-packed file 5 IoCs

    Sample is packed with UPX but required header fields are zeroed out to prevent unpacking with the default UPX tool.

  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Requests dangerous framework permissions 8 IoCs

Files

  • 8c3f538eb2f93c13e4a23018db0d96010ec80282c73c79c5007a0e0969a9c215
    .apk android arch:arm64 arch:arm arch:x86 arch:x64

    com.yfy.dingweinew

    com.yfy.gpslocal.ui.MainActivity


  • amap_resource1_0_0.png
    .apk android

    com.amap.api.map3d


Android Permissions

8c3f538eb2f93c13e4a23018db0d96010ec80282c73c79c5007a0e0969a9c215

Permissions

android.permission.ACCESS_COARSE_LOCATION

android.permission.ACCESS_FINE_LOCATION

android.permission.ACCESS_NETWORK_STATE

android.permission.ACCESS_WIFI_STATE

android.permission.CHANGE_WIFI_STATE

android.permission.INTERNET

android.permission.READ_PHONE_STATE

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.ACCESS_LOCATION_EXTRA_COMMANDS

android.permission.ACCESS_FINE_LOCATION

android.permission.ACCESS_COARSE_LOCATION

android.permission.BLUETOOTH

android.permission.BLUETOOTH_ADMIN

android.permission.REQUEST_INSTALL_PACKAGES

android.permission.READ_EXTERNAL_STORAGE

android.permission.MOUNT_UNMOUNT_FILESYSTEMS