General

  • Target

    444606c100a77af50142f8aedb43f9e25d44e4a5dd327cef788b2bc6e0226ec8

  • Size

    16.4MB

  • MD5

    226b85ee259898a516267c5c06be1359

  • SHA1

    539fd2c658286774a5529fdaf0d58cc572e58f2a

  • SHA256

    444606c100a77af50142f8aedb43f9e25d44e4a5dd327cef788b2bc6e0226ec8

  • SHA512

    90a54e3d9cdb751b407de8a1b094097eca34a573cbb7e62124f5f3cb58a9901f8c032b6d64f156054c8bd4df063e07c7bf5dc59ae3841e708bef9260c0b7d253

  • SSDEEP

    393216:Tgc6aB4WdSPs3fYluW7xxNK/eNKYnHUmsN7+tc4:TUaB4tLu4xx4/eAkHUmS7Ob

Score
8/10
upx

Malware Config

Signatures

  • Patched UPX-packed file 1 IoCs

    Sample is packed with UPX but required header fields are zeroed out to prevent unpacking with the default UPX tool.

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Requests dangerous framework permissions 11 IoCs

Files

  • 444606c100a77af50142f8aedb43f9e25d44e4a5dd327cef788b2bc6e0226ec8
    .apk android arch:arm

    org.jykds.tvlive

    org.jykds.tvlive.activity.StartActivity


  • gdtadv2.jar
    .apk android arch:arm64 arch:arm

Android Permissions

444606c100a77af50142f8aedb43f9e25d44e4a5dd327cef788b2bc6e0226ec8

Permissions

android.permission.INTERNET

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.READ_EXTERNAL_STORAGE

android.permission.ACCESS_WIFI_STATE

android.permission.READ_PHONE_STATE

android.permission.ACCESS_NETWORK_STATE

android.permission.SYSTEM_ALERT_WINDOW

android.permission.CHANGE_NETWORK_STATE

android.permission.CHANGE_WIFI_STATE

android.permission.WAKE_LOCK

android.permission.VIBRATE

android.permission.GET_ACCOUNTS

android.permission.ACCESS_FINE_LOCATION

android.permission.ACCESS_COARSE_LOCATION

android.permission.ACCESS_LOCATION_EXTRA_COMMANDS

android.permission.REQUEST_INSTALL_PACKAGES

android.permission.CAMERA

android.permission.FLASHLIGHT

android.permission.CHANGE_WIFI_MULTICAST_STATE

android.permission.WRITE_SETTINGS

android.permission.RECORD_AUDIO