General

  • Target

    baa539ccc31ac0d79289b8713af952e8

  • Size

    13.2MB

  • MD5

    baa539ccc31ac0d79289b8713af952e8

  • SHA1

    61e52c9e9120f02ca453deb7d0e8e76cbccb6f4b

  • SHA256

    6b7bf7012d0cecc78611cbb4a4222250627f91b19cef85dede7f59e5311eb6d7

  • SHA512

    2c469528795f1b211e8cedc84634a768344dcf123c8c171ed9a658b53431cfa8f2b1c741c223459f1585938691c1fdc85639d61e268c8ba3afffd81ba1179a16

  • SSDEEP

    393216:khKmqaLgvee49ea85xOPd75HBSh+XzgPO9wifYt1f3j:8OacjxOPdtHIh+0P6gtNj

Score
8/10
upx

Malware Config

Signatures

  • Patched UPX-packed file 1 IoCs

    Sample is packed with UPX but required header fields are zeroed out to prevent unpacking with the default UPX tool.

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Requests dangerous framework permissions 8 IoCs

Files

  • baa539ccc31ac0d79289b8713af952e8
    .apk android arch:arm

    com.kingstarit.tjxs_ent

    com.kingstarit.tjxs_ent.biz.splash.SplashActivity


  • amap_resource1_0_0.png
    .apk android

    com.example.amapsdkv2


Android Permissions

baa539ccc31ac0d79289b8713af952e8

Permissions

android.permission.CAMERA

android.permission.CALL_PHONE

android.permission.READ_PHONE_STATE

android.permission.GET_ACCOUNTS

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.READ_EXTERNAL_STORAGE

android.permission.INTERNET

android.permission.CHANGE_NETWORK_STATE

android.permission.ACCESS_NETWORK_STATE

android.permission.ACCESS_WIFI_STATE

android.permission.CHANGE_WIFI_STATE

android.permission.ACCESS_COARSE_LOCATION

android.permission.ACCESS_FINE_LOCATION

android.permission.ACCESS_LOCATION_EXTRA_COMMANDS

android.permission.BLUETOOTH

android.permission.BLUETOOTH_ADMIN

android.permission.VIBRATE

android.permission.GET_TASKS