General

  • Target

    0ef1812b12b096aeea49493db5f8e144_JaffaCakes118

  • Size

    9.7MB

  • MD5

    0ef1812b12b096aeea49493db5f8e144

  • SHA1

    c6019aa08f1158110c2738d7df0d63685660b5d8

  • SHA256

    2e812b6b5ef4b43cc457c609aa625924fcb9bae76175e4f5d355ee864c219198

  • SHA512

    cf9b75cca98f755b6d196ad198b6170288ca934006ef794e4d3168cfca70e27402294866d7f245de24784031e7253bfc138457514401570a3ca4a6a2cce9dcb6

  • SSDEEP

    196608:Dr21hKhjNcwKWfKr2CJgwW1UaxIDoRXKriz60rv6BsizddiU49q+P1:DrYQBxKfr2eZaxIDoRE/pdcfP1

Score
10/10

Malware Config

Extracted

Family

joker

C2

http://config.inmobi.com/config-server/v1/config/secure.cfg

http://i.w.inmobi.com/showad.asm

Signatures

  • Joker family
  • Requests dangerous framework permissions 7 IoCs

Files

  • 0ef1812b12b096aeea49493db5f8e144_JaffaCakes118
    .apk android arch:arm

    com.lemon.play.supertractor

    .MainUI


  • BannerPlugin-3.0.apk
    .apk android

    com.alimama.mobile.sdk.banner

    com.alimama.mobile.plugin.banner.service.MainActivity


  • CommonPlugin-4.6.apk
    .apk android

    com.taobao.munion.plugin.cm

    com.taobao.test.MainActivity


  • FrameworkPlugin-3.4.apk
    .apk android

    com.taobao.munion.plugin.framework


  • __xadsdk__remote__final__.jar
    .apk android
  • gdtadv2.jar
    .apk android

Android Permissions

0ef1812b12b096aeea49493db5f8e144_JaffaCakes118

Permissions

android.permission.ACCESS_NETWORK_STATE

android.permission.ACCESS_WIFI_STATE

android.permission.ACCESS_COARSE_LOCATION

android.permission.ACCESS_FINE_LOCATION

android.permission.WRITE_SETTINGS

android.permission.READ_PHONE_STATE

android.permission.READ_EXTERNAL_STORAGE

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.CHANGE_CONFIGURATION

android.permission.CHANGE_WIFI_STATE

android.permission.CHANGE_NETWORK_STATE

android.permission.INTERNET

android.permission.READ_LOGS

android.permission.SYSTEM_ALERT_WINDOW

android.permission.INTERACT_ACROSS_USERS_FULL

android.permission.VIBRATE