General

  • Target

    980e0c23d940c32dc97fe6b591b54402c299a9e5d56b71e208dd3cba1919ab9d

  • Size

    15.7MB

  • MD5

    2b04d4bf6b4905a0fcb5977db02ff39f

  • SHA1

    927a0bea9bf076fcdadcade813b320d9deb85767

  • SHA256

    980e0c23d940c32dc97fe6b591b54402c299a9e5d56b71e208dd3cba1919ab9d

  • SHA512

    5f49cc3a22748282e5dd1ab758d19d712719b9709c8f440a39b56b2556dfedfebe3a4815d7da023c408b04589652373c9d9ddb414fe395344caabb302963edd1

  • SSDEEP

    393216:4KmqaLBjMIj5zvZM3pQ2PVQtNPBlcT5MZ5QlcT5MO5G0s0T0At:4OaBMIj5zBMe2dANPDC5MZ5IC5MO5b1v

Score
8/10
upx

Malware Config

Signatures

  • Patched UPX-packed file 2 IoCs

    Sample is packed with UPX but required header fields are zeroed out to prevent unpacking with the default UPX tool.

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Requests dangerous framework permissions 15 IoCs

Files

  • 980e0c23d940c32dc97fe6b591b54402c299a9e5d56b71e208dd3cba1919ab9d
    .apk android arch:arm

    com.taihold.hxt

    io.dcloud.PandoraEntry


  • amap_resource1_0_0.png
    .apk android

    com.amap.api.map3d


Android Permissions

980e0c23d940c32dc97fe6b591b54402c299a9e5d56b71e208dd3cba1919ab9d

Permissions

android.permission.INTERNET

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.ACCESS_NETWORK_STATE

android.permission.CHANGE_NETWORK_STATE

android.permission.ACCESS_WIFI_STATE

android.permission.GET_TASKS

android.permission.RECORD_AUDIO

android.permission.GET_ACCOUNTS

android.permission.MODIFY_AUDIO_SETTINGS

android.permission.ACCESS_LOCATION_EXTRA_COMMANDS

android.permission.MOUNT_UNMOUNT_FILESYSTEMS

android.permission.READ_CONTACTS

android.permission.READ_PHONE_STATE

android.permission.CHANGE_WIFI_STATE

android.permission.VIBRATE

android.permission.READ_LOGS

android.permission.WAKE_LOCK

android.permission.CALL_PHONE

android.permission.FLASHLIGHT

android.permission.ACCESS_COARSE_LOCATION

android.permission.WRITE_CONTACTS

android.permission.ACCESS_FINE_LOCATION

android.permission.WRITE_SETTINGS

android.permission.CAMERA

android.permission.READ_EXTERNAL_STORAGE

com.android.launcher.permission.UNINSTALL_SHORTCUT

com.huawei.android.launcher.permission.CHANGE_BADGE

com.android.launcher.permission.INSTALL_SHORTCUT

com.android.launcher.permission.READ_SETTINGS

com.android.launcher2.permission.READ_SETTINGS

com.android.launcher3.permission.READ_SETTINGS

com.yulong.android.launcherL.permission.READ_SETTINGS

com.meizu.flyme.launcher.permission.READ_SETTINGS

com.bbk.launcher2.permission.READ_SETTINGS

com.oppo.launcher.permission.READ_SETTINGS

com.htc.launcher.permission.READ_SETTINGS

com.qiku.launcher.permission.READ_SETTINGS

com.huawei.android.launcher.permission.READ_SETTINGS

com.zte.mifavor.launcher.permission.READ_SETTINGS

com.lenovo.launcher.permission.READ_SETTINGS

com.google.android.launcher.permission.READ_SETTINGS

com.yulong.android.launcher3.READ_SETTINGS

org.adw.launcher.permission.READ_SETTINGS

com.qihoo360.launcher.permission.READ_SETTINGS

com.lge.launcher.permission.READ_SETTINGS

net.qihoo.launcher.permission.READ_SETTINGS

org.adwfreak.launcher.permission.READ_SETTINGS

org.adw.launcher_donut.permission.READ_SETTINGS

com.huawei.launcher3.permission.READ_SETTINGS

com.fede.launcher.permission.READ_SETTINGS