General

  • Target

    687734ba437378670c4bee8475282254_JaffaCakes118

  • Size

    30.2MB

  • MD5

    687734ba437378670c4bee8475282254

  • SHA1

    b66e268698effd68a78d62addb0b48f4bf2def01

  • SHA256

    ade6c338a4b4ef3c246172a31d502eb8cdf7bec6ef6faf15d6fa13cf3fc3ad91

  • SHA512

    16c7d1dd758ab6201333388133189a5ec052c8e8b361a7862d3e14fc2c14599995d1ccdc383855fd161a2cd6cbc64358d5df3d022efb9bbb2b76155057eac20e

  • SSDEEP

    786432:O6OaTwi4lP/473brfxTt2Ds/SI5OE4ErWyUNuW:8aTwiaCXf3ahDaWyY

Score
8/10
upx

Malware Config

Signatures

  • Patched UPX-packed file 1 IoCs

    Sample is packed with UPX but required header fields are zeroed out to prevent unpacking with the default UPX tool.

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Requests dangerous framework permissions 14 IoCs

Files

  • 687734ba437378670c4bee8475282254_JaffaCakes118
    .apk android arch:arm

    com.guixingtang.huohunjia_driver

    driver.LunchActivity


  • amap_resource1_0_0.png
    .apk android

    com.amap.api.map3d


Android Permissions

687734ba437378670c4bee8475282254_JaffaCakes118

Permissions

com.coloros.mcs.permission.RECIEVE_MCS_MESSAGE

com.sonyericsson.home.permission.BROADCAST_BADGE

com.sec.android.provider.badge.permission.READ

com.sec.android.provider.badge.permission.WRITE

com.huawei.android.launcher.permission.CHANGE_BADGE

com.huawei.android.launcher.permission.READ_SETTINGS

com.huawei.android.launcher.permission.WRITE_SETTINGS

android.permission.CAMERA

android.permission.INTERNET

android.permission.READ_EXTERNAL_STORAGE

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.MOUNT_UNMOUNT_FILESYSTEMS

android.permission.CALL_PHONE

android.permission.ACCESS_NETWORK_STATE

android.permission.ACCESS_WIFI_STATE

android.permission.ACCESS_COARSE_LOCATION

android.permission.RECEIVE_USER_PRESENT

android.permission.WAKE_LOCK

android.permission.READ_PHONE_STATE

android.permission.VIBRATE

android.permission.KILL_BACKGROUND_PROCESSES

android.permission.ACCESS_FINE_LOCATION

com.guixingtang.huohunjia_driver.permission.JPUSH_MESSAGE

com.lenovo.launcher.permission.READ_SETTINGS

com.lenovo.launcher.permission.WRITE_SETTINGS

com.iLoong.permission.WRITE_SETTINGS

com.iLoong.permission.READ_SETTINGS

cn.nubia.launcher.permission.WRITE_SETTINGS

cn.nubia.launcher.permission.READ_SETTINGS

com.smartisanos.launcher.WRITE_DATABASE

com.smartisanos.launcher.READ_DATABASE

com.smartisanos.launcher.data.ExportDataProvider

com.teslacoilsw.launcher.permission.WRITE_SETTINGS

com.teslacoilsw.launcher.permission.READ_SETTINGS

com.meizu.flyme.launcher.permission.READ_SETTINGS

com.meizu.flyme.launcher.permission.WRITE_SETTINGS

com.ztemt.launcher.permission.WRITE_SETTINGS

com.ztemt.launcher.permission.READ_SETTINGS

com.zte.lqsoft.launcher.permission.READ_SETTINGS

com.zte.lqsoft.launcher.permission.WRITE_SETTINGS

com.baoruan.launcher2.permission.WRITE_SETTINGS

com.baoruan.launcher2.permission.READ_SETTINGS

com.fineos.launcher.permission.READ_SETTINGS

com.fineos.launcher.permission.WRITE_SETTINGS

com.ibingo.launcher.permission.WRITE_SETTINGS

com.ibingo.launcher.permission.READ_SETTINGS

com.zui.launcher.permission.WRITE_SETTINGS

com.zui.launcher.permission.READ_SETTINGS

com.qihoo360.screenlock.permission.READ_LOCAL_THEME

com.qihoo360.screenlock.permission.WRITE_LOCAL_THEME