General

  • Target

    949dc438fbe4517ebe6eb6c22aecf82d_JaffaCakes118

  • Size

    14.8MB

  • MD5

    949dc438fbe4517ebe6eb6c22aecf82d

  • SHA1

    6aed65f19a7296f5940d617740c1a66b1d2f7c01

  • SHA256

    8aa88e3aaa4e05c414a9e13c3c0e85d01dc303c73212ee58d6d5b6572e11512d

  • SHA512

    54bc06b0fe22d6f779ab9b6412b1dc431fc6186fbe09abf43def6c683194ef9e1711fac33ff57ab45e4eda6baa8c1101f1f9eff4f0ed7b56de6a64c640f8067d

  • SSDEEP

    393216:mZ80p972edHPQB532IcH1gQTBiBJn3dcI7eEDBkDsELguWZSv:mW0T7dHw3XcVgmBKtkgZ2

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Requests dangerous framework permissions 9 IoCs

Files

  • 949dc438fbe4517ebe6eb6c22aecf82d_JaffaCakes118
    .apk android arch:arm

    com.taojun.sushigone.m4399

    cn.cmgame.billing.api.GameOpenActivity


  • unicom_resource.dat
    .apk android

    com.unicom.resourcepro


Android Permissions

949dc438fbe4517ebe6eb6c22aecf82d_JaffaCakes118

Permissions

android.permission.INTERNET

android.permission.ACCESS_NETWORK_STATE

android.permission.ACCESS_WIFI_STATE

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.SEND_SMS

android.permission.READ_PHONE_STATE

android.permission.READ_CONTACTS

android.permission.SYSTEM_ALERT_WINDOW

android.permission.ACCESS_FINE_LOCATION

com.android.launcher.permission.INSTALL_SHORTCUT

com.android.launcher.permission.UNINSTALL_SHORTCUT

com.android.launcher.permission.READ_SETTINGS

com.android.launcher.permission.WRITE_SETTINGS

android.permission.BLUETOOTH_ADMIN

android.permission.DISABLE_KEYGUARD

android.permission.GET_TASKS

android.permission.ACCESS_COARSE_LOCATION

android.permission.CHANGE_NETWORK_STATE

android.permission.READ_EXTERNAL_STORAGE

android.permission.BLUETOOTH

android.permission.MOUNT_UNMOUNT_FILESYSTEMS

android.permission.WRITE_SMS

android.permission.READ_SMS