General

  • Target

    15e2cdad1c5bccf68f3bed3c6d57e837_JaffaCakes118

  • Size

    10.9MB

  • MD5

    15e2cdad1c5bccf68f3bed3c6d57e837

  • SHA1

    5f6be50bc33b38bdadb9436f06707e9617d06dba

  • SHA256

    24fca1cc0f0b44409094bf45f04cd6ca611496d7a8ff3cd0d53f511f3afc425b

  • SHA512

    c42134c649456ed9d9f2d89197b4aeb406b7857290a8be0881548579475c399c4134e4a8620b0651b9eb1d515972e5b7ff9d21031c2d2bd7fac3a6a272e4d114

  • SSDEEP

    196608:hp2PHChm4FZeEEbzbxhked1t240gFOBZzudDSu+2wBgpb0KDM1IlgB5MzzZ23tI0:hp4zfhzNm424Dc2oBI0KgizmIiN

Score
10/10

Malware Config

Extracted

Family

joker

C2

http://open.weixin.qq.com/connect/sdk/qrconnect?appid=%s&noncestr=%s&timestamp=%s&scope=%s&signature=%s

https://api.weibo.com/2/proxy/sdk/statistic.json

Signatures

  • Joker family
  • Requests dangerous framework permissions 10 IoCs

Files

  • 15e2cdad1c5bccf68f3bed3c6d57e837_JaffaCakes118
    .apk android arch:arm arch:x86

    com.cangshutun

    io.dcloud.PandoraEntry


  • tcore.jar
    .apk android

Android Permissions

15e2cdad1c5bccf68f3bed3c6d57e837_JaffaCakes118

Permissions

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.INTERNET

android.permission.READ_PHONE_STATE

android.permission.ACCESS_WIFI_STATE

android.permission.ACCESS_NETWORK_STATE

android.permission.GET_TASKS

android.permission.MODIFY_AUDIO_SETTINGS

android.permission.MOUNT_UNMOUNT_FILESYSTEMS

android.permission.INTERNET

android.permission.CHANGE_WIFI_STATE

android.permission.READ_PHONE_STATE

android.permission.VIBRATE

android.permission.READ_LOGS

android.permission.WAKE_LOCK

android.permission.CALL_PHONE

android.permission.FLASHLIGHT

android.permission.ACCESS_WIFI_STATE

android.permission.ACCESS_COARSE_LOCATION

android.permission.SYSTEM_ALERT_WINDOW

android.permission.ACCESS_FINE_LOCATION

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.ACCESS_NETWORK_STATE

android.permission.WRITE_SETTINGS

android.permission.RECEIVE_BOOT_COMPLETED

android.permission.CAMERA

com.android.launcher.permission.INSTALL_SHORTCUT

com.android.launcher.permission.UNINSTALL_SHORTCUT

com.android.launcher.permission.READ_SETTINGS

com.android.launcher2.permission.READ_SETTINGS

com.android.launcher3.permission.READ_SETTINGS

com.yulong.android.launcherL.permission.READ_SETTINGS

com.meizu.flyme.launcher.permission.READ_SETTINGS

com.bbk.launcher2.permission.READ_SETTINGS

com.oppo.launcher.permission.READ_SETTINGS

com.htc.launcher.permission.READ_SETTINGS

com.qiku.launcher.permission.READ_SETTINGS

com.huawei.android.launcher.permission.READ_SETTINGS

com.zte.mifavor.launcher.permission.READ_SETTINGS

com.lenovo.launcher.permission.READ_SETTINGS

com.google.android.launcher.permission.READ_SETTINGS

com.yulong.android.launcher3.READ_SETTINGS

org.adw.launcher.permission.READ_SETTINGS

com.qihoo360.launcher.permission.READ_SETTINGS

com.lge.launcher.permission.READ_SETTINGS

net.qihoo.launcher.permission.READ_SETTINGS

org.adwfreak.launcher.permission.READ_SETTINGS

org.adw.launcher_donut.permission.READ_SETTINGS

com.huawei.launcher3.permission.READ_SETTINGS

com.fede.launcher.permission.READ_SETTINGS

com.sec.android.app.twlauncher.settings.READ_SETTINGS