General

  • Target

    3f622c8cf33063c20bee60ab950ee87e_JaffaCakes118

  • Size

    30.3MB

  • MD5

    3f622c8cf33063c20bee60ab950ee87e

  • SHA1

    a15f218ec66f6ff8e39444ea03a3d620bbbd84cb

  • SHA256

    79309298e1146d371343f4970072a6d00e02ab7631099f4ffc85162517c2f920

  • SHA512

    071f74c48bf92a1d839879d91e8b77d4c968336fbc6f1b716c71adc919e5915d7d420c3e8200da429e4a360a98da52378d0707424a1e8671a048c28977997215

  • SSDEEP

    786432:QOarwudFvrei47zbrfxTt2Ds/SIeOtEry4FNuX:TarwuDeXf3aAtay4K

Score
8/10
upx

Malware Config

Signatures

  • Patched UPX-packed file 1 IoCs

    Sample is packed with UPX but required header fields are zeroed out to prevent unpacking with the default UPX tool.

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Requests dangerous framework permissions 14 IoCs

Files

  • 3f622c8cf33063c20bee60ab950ee87e_JaffaCakes118
    .apk android arch:arm

    com.guixingtang.huohunjia_driver

    driver.LunchActivity


  • amap_resource1_0_0.png
    .apk android

    com.amap.api.map3d


Android Permissions

3f622c8cf33063c20bee60ab950ee87e_JaffaCakes118

Permissions

com.coloros.mcs.permission.RECIEVE_MCS_MESSAGE

com.sonyericsson.home.permission.BROADCAST_BADGE

com.sec.android.provider.badge.permission.READ

com.sec.android.provider.badge.permission.WRITE

com.huawei.android.launcher.permission.CHANGE_BADGE

com.huawei.android.launcher.permission.READ_SETTINGS

com.huawei.android.launcher.permission.WRITE_SETTINGS

android.permission.CAMERA

android.permission.INTERNET

android.permission.READ_EXTERNAL_STORAGE

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.MOUNT_UNMOUNT_FILESYSTEMS

android.permission.CALL_PHONE

android.permission.ACCESS_NETWORK_STATE

android.permission.ACCESS_WIFI_STATE

android.permission.ACCESS_COARSE_LOCATION

android.permission.RECEIVE_USER_PRESENT

android.permission.WAKE_LOCK

android.permission.READ_PHONE_STATE

android.permission.VIBRATE

android.permission.KILL_BACKGROUND_PROCESSES

android.permission.ACCESS_FINE_LOCATION

com.guixingtang.huohunjia_driver.permission.JPUSH_MESSAGE

com.lenovo.launcher.permission.READ_SETTINGS

com.lenovo.launcher.permission.WRITE_SETTINGS

com.iLoong.permission.WRITE_SETTINGS

com.iLoong.permission.READ_SETTINGS

cn.nubia.launcher.permission.WRITE_SETTINGS

cn.nubia.launcher.permission.READ_SETTINGS

com.smartisanos.launcher.WRITE_DATABASE

com.smartisanos.launcher.READ_DATABASE

com.smartisanos.launcher.data.ExportDataProvider

com.teslacoilsw.launcher.permission.WRITE_SETTINGS

com.teslacoilsw.launcher.permission.READ_SETTINGS

com.meizu.flyme.launcher.permission.READ_SETTINGS

com.meizu.flyme.launcher.permission.WRITE_SETTINGS

com.ztemt.launcher.permission.WRITE_SETTINGS

com.ztemt.launcher.permission.READ_SETTINGS

com.zte.lqsoft.launcher.permission.READ_SETTINGS

com.zte.lqsoft.launcher.permission.WRITE_SETTINGS

com.baoruan.launcher2.permission.WRITE_SETTINGS

com.baoruan.launcher2.permission.READ_SETTINGS

com.fineos.launcher.permission.READ_SETTINGS

com.fineos.launcher.permission.WRITE_SETTINGS

com.ibingo.launcher.permission.WRITE_SETTINGS

com.ibingo.launcher.permission.READ_SETTINGS

com.zui.launcher.permission.WRITE_SETTINGS

com.zui.launcher.permission.READ_SETTINGS

com.qihoo360.screenlock.permission.READ_LOCAL_THEME

com.qihoo360.screenlock.permission.WRITE_LOCAL_THEME