General

  • Target

    1716a041904451f785aece765b39b069_JaffaCakes118

  • Size

    21.6MB

  • MD5

    1716a041904451f785aece765b39b069

  • SHA1

    6784a7195fdd8b8279f57aad9060571c41648db7

  • SHA256

    f1a07bc273668c97f0195097d64cd1415aec195c72045ece92d64ec6e5bfc5d7

  • SHA512

    251bec1fe94ace04e95ae78f717db3e1739137c471fc28235d9abc476de1d7274cedca56531eb56d3b6f829bdee2492bc80c51d487149b31eb59596596080c6f

  • SSDEEP

    393216:7POuK7mH8usWTCWeX3TmVM8HloJaaBYn//bKaPyxbkd:zOu1PqWeXodHCMbuG

Score
6/10

Malware Config

Signatures

  • Declares services with permission to bind to the system 1 IoCs
  • Requests dangerous framework permissions 7 IoCs

Files

  • 1716a041904451f785aece765b39b069_JaffaCakes118
    .apk android arch:arm arch:mips arch:x86

    cellfish.smurfs

    com.icecream.act.MainActivity


Android Permissions

1716a041904451f785aece765b39b069_JaffaCakes118

Permissions

android.permission.GET_ACCOUNTS

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.MOUNT_UNMOUNT_FILESYSTEMS

android.permission.READ_PHONE_STATE

android.permission.ACCESS_NETWORK_STATE

android.permission.INTERNET

android.permission.SYSTEM_ALERT_WINDOW

android.permission.GET_TASKS

com.android.launcher.permission.INSTALL_SHORTCUT

com.android.launcher.permission.UNINSTALL_SHORTCUT

android.permission.READ_SMS

com.google.android.gm.permission.READ_CONTENT_PROVIDER

android.permission.READ_CONTACTS

android.permission.INTERNET

android.permission.ACCESS_COARSE_LOCATION

com.android.vending.BILLING

cellfish.smurfs.permission.C2D_MESSAGE

com.google.android.c2dm.permission.RECEIVE

android.permission.RECEIVE_BOOT_COMPLETED

android.permission.WAKE_LOCK

android.permission.ACCESS_NETWORK_STATE