General

  • Target

    9415685eff3bd9421052846618cf54d2.bin

  • Size

    73.9MB

  • MD5

    85564ed2c2142cac87ce9fc9106936d6

  • SHA1

    18c5beeeb072e90ef7d265e3489abf0dfbb0da0e

  • SHA256

    898052ac533cd0cf8b2d0007982b9bd4de833bbd0cd2d37e5384ebcbbbb1988d

  • SHA512

    0244741d75ae186b6d1f869d02ae2b7819d5ac0fa31c775cc7223b85efd50dd67f7f3215bc3f81605b17b638d203a2b64ad8d38484ebe84e6a0316e6de0620e0

  • SSDEEP

    1572864:VPgPu0pevmFgDp+CRVMhlcQk1WdDJS4dP67WYoD/0DKuJboK3u2CkTocOo8Zp:VI3YmFS+CRSjoWdD04tD+KiboK+6844p

Score
8/10
upx

Malware Config

Signatures

  • Patched UPX-packed file 2 IoCs

    Sample is packed with UPX but required header fields are zeroed out to prevent unpacking with the default UPX tool.

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Declares services with permission to bind to the system 3 IoCs
  • Requests dangerous framework permissions 23 IoCs

Files

  • 9415685eff3bd9421052846618cf54d2.bin
    .zip

    Password: infected

  • 0004704d9c83f859a1460929d3a0684afb287982eadd3da32c9f02dc2ce24487.apk
    .apk android arch:arm64 arch:arm

    Password: infected

    com.pineapple.yellow

    com.pineapple.yellow.Main