General

  • Target

    87798e302f522a9dc1b284e1798bf0fe_JaffaCakes118

  • Size

    32.0MB

  • MD5

    87798e302f522a9dc1b284e1798bf0fe

  • SHA1

    b227afad3a6ebfa97134370a8a08104b503c13b8

  • SHA256

    bb1e8068e222e6c1580ab403e31973f9a117f532e76beb1de63633b11237640e

  • SHA512

    14990b7a58ceffd0123c98ecdb6e1304c4cc168f5addf7bf1d7c41daccafc2c7cfd8db3b45e59aeea9bc66ce512bb1c2df458aac1f33e34ba2d8c4c127c9bac8

  • SSDEEP

    786432:ROaVfcF7EM87PFJTkYNNYT1CrqNYT1CrNAsxKzya4jMeX2I2T9zb:4aVO7hAOYkT1yPT1y5KzcM8gZb

Score
8/10
upx

Malware Config

Signatures

  • Patched UPX-packed file 5 IoCs

    Sample is packed with UPX but required header fields are zeroed out to prevent unpacking with the default UPX tool.

  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Requests dangerous framework permissions 9 IoCs

Files

  • 87798e302f522a9dc1b284e1798bf0fe_JaffaCakes118
    .apk android arch:arm64 arch:arm arch:x86 arch:x64

    com.micropole.yiyanmall

    com.micropole.yiyanmall.ui.activity.SplashActivity


  • amap_resource1_0_0.png
    .apk android

    com.example.amapsdkv2


Android Permissions

87798e302f522a9dc1b284e1798bf0fe_JaffaCakes118

Permissions

android.permission.INTERNET

android.permission.CALL_PHONE

android.permission.READ_PHONE_STATE

android.permission.ACCESS_FINE_LOCATION

android.permission.ACCESS_COARSE_LOCATION

android.permission.GET_TASKS

android.permission.ACCESS_WIFI_STATE

android.permission.ACCESS_NETWORK_STATE

android.permission.CHANGE_WIFI_STATE

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.CAMERA

android.permission.VIBRATE

android.permission.ACCESS_LOCATION_EXTRA_COMMANDS

android.permission.BLUETOOTH

android.permission.BLUETOOTH_ADMIN

android.permission.READ_EXTERNAL_STORAGE

android.permission.PACKAGE_USAGE_STATS

android.permission.RECEIVE_SMS