General

  • Target

    7b82f9c7a5873a99b9a772813db43932_JaffaCakes118

  • Size

    31.5MB

  • MD5

    7b82f9c7a5873a99b9a772813db43932

  • SHA1

    df205cebaf71b646faac8d92c986abbb5ba48add

  • SHA256

    7e228a31a005e843bd5225c41489c998e4480739d0ecb198c1c933535e30dbc6

  • SHA512

    52c37be0d91a5bad4aa5082f22e4338feb48b81357140f4707ed25c6b5f0a437f5bf59721eee662a8f8773f89c7983477ae5f585f47f968927e97196ecaed153

  • SSDEEP

    393216:Ri75KT9v76R9E6il4l+7zbPRQ2sKRmDNVloC3EQ8EWyfl7kJUXGfR1FdNJ/PTtCe:45Kh7I58vRQ2DRmDfeC03I4v9yy4W

Score
6/10

Malware Config

Signatures

  • Requests dangerous framework permissions 12 IoCs

Files

  • 7b82f9c7a5873a99b9a772813db43932_JaffaCakes118
    .apk android arch:arm arch:x86

    com.yodo1.ctr2.PPTV_01

    com.yodo1.sdk.game.Yodo14GameSplashActivity


Android Permissions

7b82f9c7a5873a99b9a772813db43932_JaffaCakes118

Permissions

android.permission.INTERNET

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.ACCESS_NETWORK_STATE

android.permission.ACCESS_WIFI_STATE

android.permission.READ_PHONE_STATE

android.permission.READ_LOGS

android.permission.ACCESS_NETWORK_STATE

android.permission.INTERNET

android.permission.READ_PHONE_STATE

android.permission.ACCESS_NETWORK_STATE

android.permission.READ_PHONE_STATE

android.permission.SEND_SMS

android.permission.INTERNET

android.permission.ACCESS_WIFI_STATE

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.MOUNT_UNMOUNT_FILESYSTEMS

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.INTERNET

android.permission.SEND_SMS

android.permission.READ_PHONE_STATE

android.permission.ACCESS_NETWORK_STATE

android.permission.DISABLE_KEYGUARD

android.permission.ACCESS_WIFI_STATE

android.permission.READ_PHONE_STATE

android.permission.SEND_SMS

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.INTERNET