General

  • Target

    757a0d1ce911c3bc9ec943971b37218b_JaffaCakes118

  • Size

    17.6MB

  • MD5

    757a0d1ce911c3bc9ec943971b37218b

  • SHA1

    3fe73636ff00b29b6fd9de68bc0076380c53c93d

  • SHA256

    09373bbe4e2e130ce3552c22f627c4c09081b487e778c5c80d4ef3bcc2d39238

  • SHA512

    1f4ee686ee58ea3724bbdafd70e47a2e29166b9619d51a4dc45c8fedbe2d82ccddc639f41f34403c30e9a361b0fee641676952ed39a21c72e9f93989d4151bf1

  • SSDEEP

    393216:zKmqaLGoCNfe3mePhvxMLclxgRPNUvnS4xWMmvb4W:zOaTckhvL/gRPNUvnS0WzH

Score
8/10
upx

Malware Config

Signatures

  • Patched UPX-packed file 1 IoCs

    Sample is packed with UPX but required header fields are zeroed out to prevent unpacking with the default UPX tool.

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Requests dangerous framework permissions 7 IoCs

Files

  • 757a0d1ce911c3bc9ec943971b37218b_JaffaCakes118
    .apk android arch:arm

    com.qukuaihongbao

    com.gxhongbao.activity.RSplashActivity


  • amap_resource1_0_0.png
    .apk android

    com.example.amapsdkv2

    com.amap.api.maps.offlinemap.OfflineMapActivity


  • bdxadsdk.jar
    .apk android
  • gdtadv2.jar
    .apk android

Android Permissions

757a0d1ce911c3bc9ec943971b37218b_JaffaCakes118

Permissions

android.permission.INTERNET

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.ACCESS_NETWORK_STATE

android.permission.ACCESS_WIFI_STATE

android.permission.READ_PHONE_STATE

android.permission.ACCESS_COARSE_LOCATION

android.permission.CHANGE_WIFI_STATE

android.permission.ACCESS_FINE_LOCATION

android.permission.ACCESS_LOCATION_EXTRA_COMMANDS

android.permission.READ_EXTERNAL_STORAGE

android.permission.REQUEST_INSTALL_PACKAGES

android.permission.MOUNT_UNMOUNT_FILESYSTEMS

android.permission.ACCESS_LOCATION_EXTRA_COMMANDS

android.permission.BLUETOOTH

android.permission.BLUETOOTH_ADMIN

android.permission.GET_TASKS

android.permission.CALL_PHONE