General

  • Target

    42a46c967be00b401ae4cd6313eeadf9

  • Size

    23.0MB

  • MD5

    42a46c967be00b401ae4cd6313eeadf9

  • SHA1

    6bb9944974b479c95c8024727ab324e3a0028c0e

  • SHA256

    b3855b7f8d1c4319aeccdb7647378a9e7897b032c4ee48ffe11085512970bea7

  • SHA512

    d21e821ce37035cfd6a9f5ef50bd77839e0805c6513c77f4b81eb4caf04d80fa9226313673852f88f6bfc9f55cc7f031a8664021259bbf52f5f24b64c986cdcc

  • SSDEEP

    393216:KtkxW1ly91/GD0KCo+j/Hx6SdmBnOKiXCakWThosOdHw6fMRlJAeODdKBI:KkolSoFCfj/H0Em5isTjm6ERlSv+I

Score
8/10
upx

Malware Config

Signatures

  • Patched UPX-packed file 1 IoCs

    Sample is packed with UPX but required header fields are zeroed out to prevent unpacking with the default UPX tool.

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Requests dangerous framework permissions 4 IoCs

Files

  • 42a46c967be00b401ae4cd6313eeadf9
    .apk android arch:arm

    com.zhl.fuckvideo

    com.zhl.fuckvideo.activity.SplashActivity


Android Permissions

42a46c967be00b401ae4cd6313eeadf9

Permissions

android.permission.INTERNET

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.READ_EXTERNAL_STORAGE

android.permission.ACCESS_NETWORK_STATE

android.permission.ACCESS_WIFI_STATE

android.permission.READ_PHONE_STATE

android.permission.REQUEST_INSTALL_PACKAGES

android.permission.READ_LOGS

android.permission.CHANGE_WIFI_STATE

android.permission.MOUNT_UNMOUNT_FILESYSTEMS