General

  • Target

    6d0d4e34b5ec5990de917fc88e8a5f5b_JaffaCakes118

  • Size

    32.0MB

  • MD5

    6d0d4e34b5ec5990de917fc88e8a5f5b

  • SHA1

    d83d7eb74394542fe66051303c37c63f8840eac5

  • SHA256

    f3eecce05b75c13832ab717b20e797823f89e165b0ee8ebd7ead8c1e043a88be

  • SHA512

    4fcf4553dace76506040643b59fb68b718b0b3f89bb5cc4d18da890cc7997e852a4e95818fc4bcea5eadb2d94541a8deb10ba5601c8854c2ac5b93eba9f54598

  • SSDEEP

    786432:DwnOaO2dqcF7EM87PFJTkYNNYT1CrqNYT1CrNAsxKzya4jMeX2c2T9z4:Dbanh7hAOYkT1yPT1y5KzcM4gZ4

Score
8/10
upx

Malware Config

Signatures

  • Patched UPX-packed file 5 IoCs

    Sample is packed with UPX but required header fields are zeroed out to prevent unpacking with the default UPX tool.

  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Requests dangerous framework permissions 9 IoCs

Files

  • 6d0d4e34b5ec5990de917fc88e8a5f5b_JaffaCakes118
    .apk android arch:arm64 arch:arm arch:x86 arch:x64

    com.micropole.yiyanmall

    com.micropole.yiyanmall.ui.activity.SplashActivity


  • amap_resource1_0_0.png
    .apk android

    com.example.amapsdkv2


Android Permissions

6d0d4e34b5ec5990de917fc88e8a5f5b_JaffaCakes118

Permissions

android.permission.INTERNET

android.permission.CALL_PHONE

android.permission.READ_PHONE_STATE

android.permission.ACCESS_FINE_LOCATION

android.permission.ACCESS_COARSE_LOCATION

android.permission.GET_TASKS

android.permission.ACCESS_WIFI_STATE

android.permission.ACCESS_NETWORK_STATE

android.permission.CHANGE_WIFI_STATE

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.CAMERA

android.permission.VIBRATE

android.permission.ACCESS_LOCATION_EXTRA_COMMANDS

android.permission.BLUETOOTH

android.permission.BLUETOOTH_ADMIN

android.permission.READ_EXTERNAL_STORAGE

android.permission.PACKAGE_USAGE_STATS

android.permission.RECEIVE_SMS