General

  • Target

    a0c9d1ca7de98314f894bd408d503acf.bin

  • Size

    74.1MB

  • MD5

    245cdbf32e00d7c68439ae65d2152b16

  • SHA1

    1e6a7f865467f2d4e6653f42345006a1035812b6

  • SHA256

    f7fb5cd882a32b3c2b2738e668e8bfe8c96b0e586ceef53fa22b1b26f8aeb24a

  • SHA512

    e2f22b13bca493514594d9a1f2abef7fea6c6630d3ab52e41ea881bccf5bc8b043146f9a696274721e78f23b05d57f5c3f4025a10de30e56b92b0376bc589227

  • SSDEEP

    1572864:8bK658CSXgbR475l4BuUks6s+BFbzbXpvT9FUCra/XpiRS:878IbR475E+fbJ79F2cY

Score
8/10
upx

Malware Config

Signatures

  • Patched UPX-packed file 2 IoCs

    Sample is packed with UPX but required header fields are zeroed out to prevent unpacking with the default UPX tool.

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Declares services with permission to bind to the system 3 IoCs
  • Requests dangerous framework permissions 23 IoCs

Files

  • a0c9d1ca7de98314f894bd408d503acf.bin
    .zip

    Password: infected

  • 0dfda904f846f0a999ef1162eed9865df81432780a17890e00de3794f11ba53a.apk
    .apk android arch:arm64 arch:arm

    Password: infected

    com.yowhats.software

    com.yowhats.software.Main