General

  • Target

    com.aesq.zb.pj.apk

  • Size

    16.9MB

  • MD5

    a16b23cacdad8695cf498fd7bd830c45

  • SHA1

    4abfcfa9e5c7219b175e3866dd6e7db76afa1e13

  • SHA256

    fb34b45aace4e42799e431a90e7bb8ee5a8ddbb4509c3143c82ca1a66c0ebff8

  • SHA512

    3f1e10d90ef5ecaad675cfab3cf48eb493a238ee0a069c00ebff3ec3737a7cf3334646a1dcc949d937e89f2a701b971a85d22cbfccd8b3ece2111a1ad5cb271a

  • SSDEEP

    393216:dlemL1tSI7C3HyDBui0fMWdmV7++ZvhLR0idRKx860F:dlFLj3mXyDruMWdmE+rdi0F

Score
8/10
upx

Malware Config

Signatures

  • Patched UPX-packed file 1 IoCs

    Sample is packed with UPX but required header fields are zeroed out to prevent unpacking with the default UPX tool.

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Requests dangerous framework permissions 10 IoCs

Files

  • com.aesq.zb.pj.apk
    .apk android arch:arm arch:x86

    io.binstream.github.demo

    com.jyzx8.fireplayer.Splash2


Android Permissions

com.aesq.zb.pj.apk

Permissions

android.permission.QUERY_ALL_PACKAGES

android.permission.INTERNET

android.permission.ACCESS_NETWORK_STATE

android.permission.ACCESS_WIFI_STATE

android.permission.READ_PHONE_STATE

android.permission.ACCESS_COARSE_LOCATION

android.permission.ACCESS_FINE_LOCATION

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.READ_EXTERNAL_STORAGE

android.permission.REQUEST_INSTALL_PACKAGES

android.permission.SYSTEM_ALERT_WINDOW

android.permission.CHANGE_WIFI_STATE

android.permission.READ_CALENDAR

android.permission.WRITE_CALENDAR

android.permission.SYSTEM_ALERT_WINDOW

android.permission.GET_TASKS

android.permission.WAKE_LOCK