General

  • Target

    8cf6c26599be8f012ba416abf6ad88b3

  • Size

    23.6MB

  • MD5

    8cf6c26599be8f012ba416abf6ad88b3

  • SHA1

    5e7af17302af3ec649fe44ee0e9a352a9dbe8f8e

  • SHA256

    43fee965279df2a9fe7433f8af55d6b0363308f8497e86ff60b286abbef8890e

  • SHA512

    b7b374b1b222fd1092a680e78ad9c099ecbe507016d812618e17801a7240e45a882ddd7cc3be2ee854aed40b62b4f480251bde7020bb6422a9a671e5d5951f83

  • SSDEEP

    393216:ZvARZHwG4Ky5YNUWNV41Oq5iQGW2NK+YZR6bilcT5M6MJ8bNgOMlcT5Mu:VA9wyy5YVNVGOq5iQGW88ZRxC5MMbNOk

Score
8/10
upx

Malware Config

Signatures

  • Patched UPX-packed file 3 IoCs

    Sample is packed with UPX but required header fields are zeroed out to prevent unpacking with the default UPX tool.

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Requests dangerous framework permissions 10 IoCs

Files

  • 8cf6c26599be8f012ba416abf6ad88b3
    .apk android arch:arm arch:x86

    com.jsruiyin.byyxx

    io.dcloud.PandoraEntry


  • amap_resource1_0_0.png
    .apk android

    com.amap.api.map3d


Android Permissions

8cf6c26599be8f012ba416abf6ad88b3

Permissions

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.INTERNET

android.permission.READ_PHONE_STATE

android.permission.ACCESS_WIFI_STATE

android.permission.ACCESS_NETWORK_STATE

android.permission.GET_TASKS

android.permission.MOUNT_UNMOUNT_FILESYSTEMS

android.permission.VIBRATE

android.permission.LOCATION_HARDWARE

android.permission.READ_LOGS

android.permission.ACCESS_WIFI_STATE

android.permission.SYSTEM_ALERT_WINDOW

android.permission.ACCESS_NETWORK_STATE

android.permission.RECEIVE_BOOT_COMPLETED

android.permission.CAMERA

android.permission.ACCESS_LOCATION_EXTRA_COMMANDS

android.permission.INTERNET

android.permission.READ_PHONE_STATE

android.permission.CHANGE_WIFI_STATE

android.permission.WAKE_LOCK

android.permission.CALL_PHONE

android.permission.ACCESS_COARSE_LOCATION

android.permission.CONTROL_LOCATION_UPDATES

android.permission.ACCESS_FINE_LOCATION

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.INSTALL_LOCATION_PROVIDER

android.permission.ACCESS_MOCK_LOCATION

android.permission.WRITE_SETTINGS

com.android.launcher.permission.INSTALL_SHORTCUT

com.android.launcher.permission.UNINSTALL_SHORTCUT

com.android.launcher.permission.READ_SETTINGS

com.android.launcher2.permission.READ_SETTINGS

com.android.launcher3.permission.READ_SETTINGS

com.yulong.android.launcherL.permission.READ_SETTINGS

com.meizu.flyme.launcher.permission.READ_SETTINGS

com.bbk.launcher2.permission.READ_SETTINGS

com.oppo.launcher.permission.READ_SETTINGS

com.htc.launcher.permission.READ_SETTINGS

com.qiku.launcher.permission.READ_SETTINGS

com.huawei.android.launcher.permission.READ_SETTINGS

com.zte.mifavor.launcher.permission.READ_SETTINGS

com.lenovo.launcher.permission.READ_SETTINGS

com.google.android.launcher.permission.READ_SETTINGS

com.yulong.android.launcher3.READ_SETTINGS

org.adw.launcher.permission.READ_SETTINGS

com.qihoo360.launcher.permission.READ_SETTINGS

com.lge.launcher.permission.READ_SETTINGS

net.qihoo.launcher.permission.READ_SETTINGS

org.adwfreak.launcher.permission.READ_SETTINGS

org.adw.launcher_donut.permission.READ_SETTINGS