General

  • Target

    683b134021a2e45b03cf1ace48ff9a0d_JaffaCakes118

  • Size

    9.6MB

  • MD5

    683b134021a2e45b03cf1ace48ff9a0d

  • SHA1

    512c02c51526a988e9796028a29b6d1b70e7b696

  • SHA256

    8253fd00e693a8dfd78af2da6be8726fd74bc2093f6a89c0908b56a2d06c5826

  • SHA512

    291f262a7dd0b4809acfe93d7836f14404e6e77126c47bec1cad6f8a13496bb374da2a7adc799a2091f90ba54d3e4ed6f47f164e1af6a11843c2d5ac02da676b

  • SSDEEP

    196608:hSl0hu3w7lnZUBwlFvULJG3iNWo2pN0wbFVxpOwREzBTw:hSb36nJl2dGCAuwP2wqBTw

Score
6/10

Malware Config

Signatures

  • Requests dangerous framework permissions 3 IoCs

Files

  • 683b134021a2e45b03cf1ace48ff9a0d_JaffaCakes118
    .apk android

    com.heros.worldcampaign

    .LoadingActivity


  • alipay_plugin_20120428msp.apk
    .apk android

    com.alipay.android.app

    .Cashier


Android Permissions

683b134021a2e45b03cf1ace48ff9a0d_JaffaCakes118

Permissions

android.permission.READ_PHONE_STATE

android.permission.INTERNET

android.permission.ACCESS_NETWORK_STATE

android.permission.ACCESS_WIFI_STATE

android.permission.WAKE_LOCK

android.permission.DEVICE_POWER

android.permission.VIBRATE

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.MOUNT_UNMOUNT_FILESYSTEMS

android.permission.GET_ACCOUNTS

android.permission.GET_TASKS

com.android.vending.BILLING

com.heros.worldcampaign.permission.C2D_MESSAGE

com.google.android.c2dm.permission.RECEIVE