General

  • Target

    位置.apk

  • Size

    21.1MB

  • MD5

    0707437733aca057a05fce2b0037d092

  • SHA1

    b640be1367157f0ceb4aa101968948fd9cdbe60d

  • SHA256

    63d14de000e956971cfbe93022e1db6916f8595a877f26a80f28912230ddd8c0

  • SHA512

    090b8656308e307bc71c64490d31e3b4650fc5ab92611a44e8f0de5f8389a57057e2fad0316480a1c1b5dd118ee066ceea19f79fe4267be3ecc7f4f839c70906

  • SSDEEP

    393216:HdVTmy+gs9E3QQ66r9iXoLifYIpSW5Ffubh6QHZ7uWxWl+JOA4sbgDFOAvFfj/fh:HSyiEv6VYUSyFubhr1xWcO6bgDFPr/fh

Score
8/10
upx

Malware Config

Signatures

  • Patched UPX-packed file 1 IoCs

    Sample is packed with UPX but required header fields are zeroed out to prevent unpacking with the default UPX tool.

  • Declares services with permission to bind to the system 1 IoCs
  • Requests dangerous framework permissions 7 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • 位置.apk
    .apk android arch:arm64 arch:arm

    com.lerist.fakelocation

    com.lerist.fakelocation.ui.activity.MainActivity


  • 3DFly.lis
    .apk android

    com.lerist.hook.injectdex


Android Permissions

位置.apk

Permissions

android.permission.CHANGE_WIFI_STATE

android.permission.INTERNET

android.permission.ACCESS_NETWORK_STATE

android.permission.ACCESS_FINE_LOCATION

android.permission.ACCESS_COARSE_LOCATION

android.permission.ACCESS_MOCK_LOCATION

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.SYSTEM_ALERT_WINDOW

android.permission.FOREGROUND_SERVICE

android.permission.READ_PHONE_STATE

com.google.android.gms.permission.ACTIVITY_RECOGNITION

android.permission.WRITE_SECURE_SETTINGS

android.permission.ACCESS_SUPERUSER

android.permission.REQUEST_DELETE_PACKAGES

android.permission.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS

android.permission.ACCESS_WIFI_STATE

android.permission.REQUEST_INSTALL_PACKAGES

com.android.vending.BILLING

android.permission.READ_EXTERNAL_STORAGE

android.permission.READ_LOGS

android.permission.GET_TASKS