General

  • Target

    11aa686e9c06098ef13cfd331eb641be_JaffaCakes118

  • Size

    30.7MB

  • MD5

    11aa686e9c06098ef13cfd331eb641be

  • SHA1

    6b7fefb5d2509e2a3f20a8f1c5fa23526f097853

  • SHA256

    75c92eba84db46a755ad85b994e30b69de0259981391f43f8c53747a733219f3

  • SHA512

    cce072a70e5c8fecf2f102016376bece0ed536b861f0a5c51eddee668fa0e05906886ce125020c84bae70765a9848c9c076ddaa89234affe8e1325ade0f48fdc

  • SSDEEP

    786432:gMOaiacEKUvubt7yU+uxkyzdJsHNUOy+PUxOTAfWYI0G:gfaiac1TJ7f3eNU/xqcTG

Score
10/10

Malware Config

Signatures

  • Joker family
  • Patched UPX-packed file 3 IoCs

    Sample is packed with UPX but required header fields are zeroed out to prevent unpacking with the default UPX tool.

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Requests dangerous framework permissions 11 IoCs

Files

  • 11aa686e9c06098ef13cfd331eb641be_JaffaCakes118
    .apk android arch:arm arch:x86

    com.daguo.bat

    io.dcloud.PandoraEntry


  • amap_resource1_0_0.png
    .apk android

    com.amap.api.map3d


Android Permissions

11aa686e9c06098ef13cfd331eb641be_JaffaCakes118

Permissions

android.permission.INTERNET

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.ACCESS_NETWORK_STATE

android.permission.CHANGE_NETWORK_STATE

android.permission.ACCESS_WIFI_STATE

android.permission.GET_TASKS

android.permission.RECORD_AUDIO

android.permission.MODIFY_AUDIO_SETTINGS

android.permission.MOUNT_UNMOUNT_FILESYSTEMS

android.permission.CHANGE_WIFI_STATE

android.permission.READ_PHONE_STATE

android.permission.VIBRATE

android.permission.READ_LOGS

android.permission.WAKE_LOCK

android.permission.CALL_PHONE

android.permission.FLASHLIGHT

android.permission.ACCESS_COARSE_LOCATION

android.permission.SYSTEM_ALERT_WINDOW

android.permission.ACCESS_FINE_LOCATION

android.permission.RECEIVE_USER_PRESENT

android.permission.WRITE_SETTINGS

android.permission.RECEIVE_BOOT_COMPLETED

android.permission.CAMERA

android.permission.READ_EXTERNAL_STORAGE

com.android.launcher.permission.UNINSTALL_SHORTCUT

com.huawei.android.launcher.permission.CHANGE_BADGE

com.android.launcher.permission.INSTALL_SHORTCUT

com.android.launcher.permission.READ_SETTINGS

com.android.launcher2.permission.READ_SETTINGS

com.android.launcher3.permission.READ_SETTINGS

com.yulong.android.launcherL.permission.READ_SETTINGS

com.meizu.flyme.launcher.permission.READ_SETTINGS

com.bbk.launcher2.permission.READ_SETTINGS

com.oppo.launcher.permission.READ_SETTINGS

com.htc.launcher.permission.READ_SETTINGS

com.qiku.launcher.permission.READ_SETTINGS

com.huawei.android.launcher.permission.READ_SETTINGS

com.zte.mifavor.launcher.permission.READ_SETTINGS

com.lenovo.launcher.permission.READ_SETTINGS

com.google.android.launcher.permission.READ_SETTINGS

com.yulong.android.launcher3.READ_SETTINGS

org.adw.launcher.permission.READ_SETTINGS

com.qihoo360.launcher.permission.READ_SETTINGS

com.lge.launcher.permission.READ_SETTINGS

net.qihoo.launcher.permission.READ_SETTINGS

org.adwfreak.launcher.permission.READ_SETTINGS

org.adw.launcher_donut.permission.READ_SETTINGS

com.huawei.launcher3.permission.READ_SETTINGS

com.fede.launcher.permission.READ_SETTINGS

com.sec.android.app.twlauncher.settings.READ_SETTINGS