General

  • Target

    0d488de7d49b4302357e8ad73ba0ba8b_JaffaCakes118

  • Size

    15.0MB

  • MD5

    0d488de7d49b4302357e8ad73ba0ba8b

  • SHA1

    e526c478db9f03f9e6efa379cb725bb842b879bd

  • SHA256

    45fd8725c765db887d9c8bfd54c2affdaca7762fb3e9fc78caf8b5889ac5b011

  • SHA512

    44cd19e796e96302a747c2882b2f30cb9c95c0fc58176ebd71dd73f36d7efa1154f59cbcdedd989dada4598cf097429ac3321e90e8280ae4b69d40c00c970109

  • SSDEEP

    393216:RP7fvGPurEFLNm6zQp9G/Ioeg6BYsCS6kDqcit5V2CV:RPzUurED5Qp9G/IoeSsFmp5rV

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Requests dangerous framework permissions 8 IoCs

Files

  • 0d488de7d49b4302357e8ad73ba0ba8b_JaffaCakes118
    .apk android arch:arm

    com.yl.tapTheFrog

    cn.cmgame.billing.api.GameOpenActivity


  • unicom_channel_resource.dat
    .apk android

    com.xiaowo.resourcepro


Android Permissions

0d488de7d49b4302357e8ad73ba0ba8b_JaffaCakes118

Permissions

android.permission.INTERNET

android.permission.ACCESS_NETWORK_STATE

android.permission.ACCESS_WIFI_STATE

android.permission.MOUNT_UNMOUNT_FILESYSTEMS

android.permission.READ_EXTERNAL_STORAGE

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.SEND_SMS

android.permission.READ_PHONE_STATE

android.permission.READ_CONTACTS

android.permission.ACCESS_FINE_LOCATION

android.permission.ACCESS_COARSE_LOCATION

android.permission.BLUETOOTH

android.permission.BLUETOOTH_ADMIN

android.permission.SYSTEM_ALERT_WINDOW

android.permission.GET_TASKS

com.android.launcher.permission.INSTALL_SHORTCUT

com.android.launcher.permission.UNINSTALL_SHORTCUT

com.android.launcher.permission.READ_SETTINGS

com.android.launcher.permission.WRITE_SETTINGS