General

  • Target

    fe57fc5770510383a4d65cd79818ea3384a16e3d227eb88c20f9b6cbb2bacf6e

  • Size

    70.6MB

  • MD5

    b213d73f558ce056eaf8519753c68d18

  • SHA1

    df8755d5d926ff5f1a616590fb01bd8774b2a09e

  • SHA256

    fe57fc5770510383a4d65cd79818ea3384a16e3d227eb88c20f9b6cbb2bacf6e

  • SHA512

    85f5ae636ba6420d963103d7a77b26347833cd7bb20460ab2c007d1f7a0bcc6e58f8ad9047b7db1ef22f6579a5a2d14585097813ba40ae612786cd6f19781669

  • SSDEEP

    1572864:AvG8RvOA8J2mVrBvcdKUe8sUQ5avIDGtRq8DJ7Hw2Vkw:mG8JH8JbVdv8K0IatoC7Q2f

Score
10/10

Malware Config

Signatures

  • Android Triada payload 1 IoCs
  • Triada family
  • Patched UPX-packed file 2 IoCs

    Sample is packed with UPX but required header fields are zeroed out to prevent unpacking with the default UPX tool.

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Declares services with permission to bind to the system 3 IoCs
  • Requests dangerous framework permissions 23 IoCs

Files

  • fe57fc5770510383a4d65cd79818ea3384a16e3d227eb88c20f9b6cbb2bacf6e
    .zip

    Password: infected

  • c439378688072503009c4af8df7dbea1edef38fb637f526821fe610ee75f3864.apk
    .apk android arch:arm64 arch:arm

    com.woyoubmw.app

    com.woyoubmw.app.Main