General

  • Target

    0b5bff67d837c511fbd162e78bd0e831_JaffaCakes118

  • Size

    14.8MB

  • MD5

    0b5bff67d837c511fbd162e78bd0e831

  • SHA1

    56b5477a0ccca617a3189c469d282e31bb3341aa

  • SHA256

    0d581f081470a92598d046f10b35a8be41cc051065f85db6373d045731f1639b

  • SHA512

    94f5ea6ce4e85aaa08f979901cb3082f0a1724b8226d590d9755a8b579d92909111c40e37b34d258101844741878db1d6204c492f2643066b10a7599e8a1ef84

  • SSDEEP

    393216:nKmqaLorgsmeABND/CXt+rBLIv2O0I46mTiXgoNg:nOaidPAB5CXtqLnOh47TN8g

Score
8/10
upx

Malware Config

Signatures

  • Patched UPX-packed file 1 IoCs

    Sample is packed with UPX but required header fields are zeroed out to prevent unpacking with the default UPX tool.

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Requests dangerous framework permissions 6 IoCs

Files

  • 0b5bff67d837c511fbd162e78bd0e831_JaffaCakes118
    .apk android arch:arm

    com.example.administration.myapplication

    com.example.administration.myapplication.ui.activity.StartActivity


  • amap_resource1_0_0.png
    .apk android

    com.amap.api.map3d


Android Permissions

0b5bff67d837c511fbd162e78bd0e831_JaffaCakes118

Permissions

android.permission.INTERNET

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.READ_PHONE_STATE

android.permission.ACCESS_NETWORK_STATE

android.permission.ACCESS_WIFI_STATE

android.permission.ACCESS_COARSE_LOCATION

android.permission.CALL_PHONE

android.permission.RECEIVE_BOOT_COMPLETED

android.permission.REQUEST_INSTALL_PACKAGES

android.permission.DOWNLOAD_WITHOUT_NOTIFICATION

android.permission.READ_LOGS

android.permission.MOUNT_UNMOUNT_FILESYSTEMS

android.permission.READ_EXTERNAL_STORAGE

android.permission.GET_TASKS