General

  • Target

    5d8543eef5966684aef1b3681f1cd63178c79e939df040a61fca9d5bc8949c15

  • Size

    24.2MB

  • MD5

    f9a07b934bdc0b6a01de9937cb93e3df

  • SHA1

    f4614e5f8334c30957728826c5061a5a91b1c9e9

  • SHA256

    5d8543eef5966684aef1b3681f1cd63178c79e939df040a61fca9d5bc8949c15

  • SHA512

    6ee11c95446893ad472afbc293c8c6a4998446c19d691bb89d1bf6219a8a774564a7af95b1cac162e87207ebfa28cc40d0100cb4fef20a7bbce606b1b6c88c12

  • SSDEEP

    786432:jO3meOd+KtoypqbljFURctqg5E+oyGXZI:gmeOdCUma6tqgqyOe

Score
8/10
upx

Malware Config

Signatures

  • Patched UPX-packed file 2 IoCs

    Sample is packed with UPX but required header fields are zeroed out to prevent unpacking with the default UPX tool.

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Requests dangerous framework permissions 10 IoCs

Files

  • 5d8543eef5966684aef1b3681f1cd63178c79e939df040a61fca9d5bc8949c15
    .apk android arch:arm arch:x86

    pingxiang.com

    io.dcloud.PandoraEntry


  • amap_resource1_0_0.png
    .apk android

    com.amap.api.map3d


Android Permissions

5d8543eef5966684aef1b3681f1cd63178c79e939df040a61fca9d5bc8949c15

Permissions

android.permission.INTERNET

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.ACCESS_NETWORK_STATE

android.permission.CHANGE_NETWORK_STATE

android.permission.ACCESS_WIFI_STATE

android.permission.GET_TASKS

android.permission.ACCESS_COARSE_LOCATION

android.permission.ACCESS_FINE_LOCATION

android.permission.CALL_PHONE

android.permission.CAMERA

android.permission.CHANGE_WIFI_STATE

android.permission.MODIFY_AUDIO_SETTINGS

android.permission.MOUNT_UNMOUNT_FILESYSTEMS

android.permission.READ_PHONE_STATE

android.permission.RECORD_AUDIO

android.permission.VIBRATE

android.permission.WAKE_LOCK

android.permission.WRITE_SETTINGS

android.permission.READ_EXTERNAL_STORAGE

android.permission.ACCESS_LOCATION_EXTRA_COMMANDS

android.permission.BLUETOOTH

android.permission.BLUETOOTH_ADMIN

android.permission.READ_LOGS

com.android.launcher.permission.UNINSTALL_SHORTCUT

com.huawei.android.launcher.permission.CHANGE_BADGE

com.android.launcher.permission.INSTALL_SHORTCUT

com.android.launcher.permission.READ_SETTINGS

com.android.launcher2.permission.READ_SETTINGS

com.android.launcher3.permission.READ_SETTINGS

com.yulong.android.launcherL.permission.READ_SETTINGS

com.meizu.flyme.launcher.permission.READ_SETTINGS

com.bbk.launcher2.permission.READ_SETTINGS

com.oppo.launcher.permission.READ_SETTINGS

com.htc.launcher.permission.READ_SETTINGS

com.qiku.launcher.permission.READ_SETTINGS

com.huawei.android.launcher.permission.READ_SETTINGS

com.zte.mifavor.launcher.permission.READ_SETTINGS

com.lenovo.launcher.permission.READ_SETTINGS

com.google.android.launcher.permission.READ_SETTINGS

com.yulong.android.launcher3.READ_SETTINGS

org.adw.launcher.permission.READ_SETTINGS

com.qihoo360.launcher.permission.READ_SETTINGS

com.lge.launcher.permission.READ_SETTINGS

net.qihoo.launcher.permission.READ_SETTINGS

org.adwfreak.launcher.permission.READ_SETTINGS

org.adw.launcher_donut.permission.READ_SETTINGS

com.huawei.launcher3.permission.READ_SETTINGS

com.fede.launcher.permission.READ_SETTINGS

com.sec.android.app.twlauncher.settings.READ_SETTINGS

com.tencent.qqlauncher.permission.READ_SETTINGS