General

  • Target

    7cdd7bb0eecb3ce8e237b5e62793a0fe_JaffaCakes118

  • Size

    30.4MB

  • MD5

    7cdd7bb0eecb3ce8e237b5e62793a0fe

  • SHA1

    4676c3c4b5ab90c9e3a2d4e8b6e475f94cc74875

  • SHA256

    13e5db96dcd0bf70961f65757965ed1a0a866ce503741c1ca06bcc920f7ad53c

  • SHA512

    524ce052ea6f81cb688e02b3e9e8e1c092948b03eb069e52e4bb0a82b070839b1e544c510a8da6808eaab7e7fe959d12b8a53f006f21826ae3c36cc402759805

  • SSDEEP

    393216:edaMu5uCuj4mSN16QwUS9QaHHH8C1eIHcAtntLjLY0urbRX4YHE320urbRX4YHEI:edtWG4mPjcC9Dnk0KRHH0KRHCWsyfL

Score
8/10
upx

Malware Config

Signatures

  • Patched UPX-packed file 3 IoCs

    Sample is packed with UPX but required header fields are zeroed out to prevent unpacking with the default UPX tool.

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Requests dangerous framework permissions 10 IoCs

Files

  • 7cdd7bb0eecb3ce8e237b5e62793a0fe_JaffaCakes118
    .apk android arch:arm arch:x86

    com.jsruiyin.zhsxd

    io.dcloud.PandoraEntry


  • amap_resource1_0_0.png
    .apk android

    com.amap.api.map3d


Android Permissions

7cdd7bb0eecb3ce8e237b5e62793a0fe_JaffaCakes118

Permissions

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.INTERNET

android.permission.READ_PHONE_STATE

android.permission.ACCESS_WIFI_STATE

android.permission.ACCESS_NETWORK_STATE

android.permission.GET_TASKS

android.permission.MOUNT_UNMOUNT_FILESYSTEMS

android.permission.INTERNET

android.permission.CHANGE_WIFI_STATE

android.permission.READ_PHONE_STATE

android.permission.VIBRATE

android.permission.READ_LOGS

android.permission.WAKE_LOCK

android.permission.FLASHLIGHT

android.permission.CALL_PHONE

android.permission.ACCESS_WIFI_STATE

android.permission.ACCESS_COARSE_LOCATION

android.permission.SYSTEM_ALERT_WINDOW

android.permission.ACCESS_FINE_LOCATION

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.ACCESS_NETWORK_STATE

android.permission.WRITE_SETTINGS

android.permission.RECEIVE_BOOT_COMPLETED

android.permission.CAMERA

com.android.launcher.permission.INSTALL_SHORTCUT

com.android.launcher.permission.UNINSTALL_SHORTCUT

com.android.launcher.permission.READ_SETTINGS

com.android.launcher2.permission.READ_SETTINGS

com.android.launcher3.permission.READ_SETTINGS

com.yulong.android.launcherL.permission.READ_SETTINGS

com.meizu.flyme.launcher.permission.READ_SETTINGS

com.bbk.launcher2.permission.READ_SETTINGS

com.oppo.launcher.permission.READ_SETTINGS

com.htc.launcher.permission.READ_SETTINGS

com.qiku.launcher.permission.READ_SETTINGS

com.huawei.android.launcher.permission.READ_SETTINGS

com.zte.mifavor.launcher.permission.READ_SETTINGS

com.lenovo.launcher.permission.READ_SETTINGS

com.google.android.launcher.permission.READ_SETTINGS

com.yulong.android.launcher3.READ_SETTINGS

org.adw.launcher.permission.READ_SETTINGS

com.qihoo360.launcher.permission.READ_SETTINGS

com.lge.launcher.permission.READ_SETTINGS

net.qihoo.launcher.permission.READ_SETTINGS

org.adwfreak.launcher.permission.READ_SETTINGS

org.adw.launcher_donut.permission.READ_SETTINGS

com.huawei.launcher3.permission.READ_SETTINGS

com.fede.launcher.permission.READ_SETTINGS

com.sec.android.app.twlauncher.settings.READ_SETTINGS

com.tencent.qqlauncher.permission.READ_SETTINGS