General

  • Target

    a0cb485f442cfb200269747b9f6b72a2_JaffaCakes118

  • Size

    10.2MB

  • MD5

    a0cb485f442cfb200269747b9f6b72a2

  • SHA1

    e107ae3f434ffb83055d13b77844971f2c96de20

  • SHA256

    42560f5d5e1d9a27063626a9fa15b8663419bcd819ab03b92142e915ca595c8c

  • SHA512

    dba108fdd19557bea13002ad4ff6a75550b4769ffdd8810e24e5db23061cac5c0bc1183e27d2a5686c0ebb14d4f762a6023b433424ccfb494ccfa8b2c58eeb9c

  • SSDEEP

    196608:qkEg0nYp4N1qvhT7iB/0h0VDXAk1e1/nsEWV5yVI2MZ4jPtT3YATg0q3fSTqZ/Dc:tHsAcMUW6cvsEWyVZMWhDT9qPS+ZxJ4

Score
6/10

Malware Config

Signatures

  • Declares services with permission to bind to the system 1 IoCs
  • Requests dangerous framework permissions 3 IoCs

Files

  • a0cb485f442cfb200269747b9f6b72a2_JaffaCakes118
    .apk android arch:arm64 arch:arm

    com.quejnms.zmnxcn

    com.yxcorp.activity.WelComeActivity


Android Permissions

a0cb485f442cfb200269747b9f6b72a2_JaffaCakes118

Permissions

android.permission.READ_EXTERNAL_STORAGE

android.permission.GET_TASKS

android.permission.INTERNET

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.ACCESS_NETWORK_STATE

android.permission.INTERNET

android.permission.ACCESS_NETWORK_STATE

android.permission.READ_PHONE_STATE

android.permission.ACCESS_WIFI_STATE