General

  • Target

    f847cf2fc1467887889903b75d0014a2_JaffaCakes118

  • Size

    22.3MB

  • MD5

    f847cf2fc1467887889903b75d0014a2

  • SHA1

    c294e1bc8957bef1d41657b504d2d149f1e5ff74

  • SHA256

    ef1c3d0871fae968200030c69fc888d83ab2ac10fdff7657f94655c389a199e8

  • SHA512

    153a4b432a259ef9eea09c886f34da506cedbad8a5a47932e67e94ef9677bd400dc8d27a9ee8f536bf2e36100b4f0eea9d4568de5d9a532f4bada62b42d73317

  • SSDEEP

    393216:413i0MEBTVjkD5PRv5RwQqlv5RXfSlGyUNdzhJoUNShi8LDM0s:j0M2AFPRwfFPk0hasd

Score
8/10
upx

Malware Config

Signatures

  • Patched UPX-packed file 3 IoCs

    Sample is packed with UPX but required header fields are zeroed out to prevent unpacking with the default UPX tool.

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Requests dangerous framework permissions 10 IoCs

Files

  • f847cf2fc1467887889903b75d0014a2_JaffaCakes118
    .apk android arch:arm arch:mips arch:x86

    com.beingmate.mestationmallpro

    com.beingmate.mestationmallpro.view.login.SplashActivity


  • amap_resource1_0_0.png
    .apk android

    com.amap.api.map3d


Android Permissions

f847cf2fc1467887889903b75d0014a2_JaffaCakes118

Permissions

android.permission.READ_LOGS

android.permission.CAMERA

android.permission.INTERNET

android.permission.ACCESS_NETWORK_STATE

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.READ_EXTERNAL_STORAGE

android.permission.ACCESS_WIFI_STATE

android.permission.SEND_SMS

android.permission.CALL_PHONE

android.permission.READ_PHONE_STATE

android.permission.ACCESS_COARSE_LOCATION

android.permission.ACCESS_FINE_LOCATION

android.permission.CHANGE_WIFI_STATE

android.permission.CHANGE_CONFIGURATION

android.permission.WRITE_SETTINGS

android.permission.REQUEST_INSTALL_PACKAGES