General

  • Target

    716501bcaf612294aa456fbefe957d16_JaffaCakes118

  • Size

    30.6MB

  • MD5

    716501bcaf612294aa456fbefe957d16

  • SHA1

    bfc39d1e04d8e8b972f94f7c0b5099559e182a1f

  • SHA256

    1b8b4ef3dea665d509a8af6b230d69f07858892e8783ca838f2b98a08d25a58b

  • SHA512

    a27dad6609cad71b012b711db3003b98de42ce1ee2f7ced3b414abf519098268aade58f1a1d181b580248bb13cf9802b22a8e03ecaabeee567b55acb3539502c

  • SSDEEP

    786432:n0sSYe2AhE3tj/R1YRHw4Dqh2fwp9ZXq+gZ1ky6w:nGYeAYmaqh2Cin16w

Score
8/10
upx

Malware Config

Signatures

  • Patched UPX-packed file 20 IoCs

    Sample is packed with UPX but required header fields are zeroed out to prevent unpacking with the default UPX tool.

  • UPX packed file 20 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Requests dangerous framework permissions 9 IoCs

Files

  • 716501bcaf612294aa456fbefe957d16_JaffaCakes118
    .apk android arch:arm64 arch:arm arch:x86 arch:x64

    com.nbhero.jiebo

    com.nbhero.jiebo.MainActivity


  • autonavi_Resource1_1_0.png
    .apk android

    com.example.navigationsdk

    .WelcomeActivity


Android Permissions

716501bcaf612294aa456fbefe957d16_JaffaCakes118

Permissions

android.permission.INTERNET

android.permission.READ_CONTACTS

android.permission.KILL_BACKGROUND_PROCESSES

android.permission.READ_PHONE_STATE

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.ACCESS_COARSE_LOCATION

android.permission.ACCESS_NETWORK_STATE

android.permission.ACCESS_FINE_LOCATION

android.permission.READ_PHONE_STATE

android.permission.ACCESS_WIFI_STATE

android.permission.CHANGE_WIFI_STATE

android.permission.WAKE_LOCK

android.permission.READ_EXTERNAL_STORAGE

android.permission.CAMERA

android.permission.ACCESS_LOCATION_EXTRA_COMMANDS

android.permission.BLUETOOTH

android.permission.BLUETOOTH_ADMIN

android.permission.INSTALL_PACKAGES