General

  • Target

    a8b8d2d332118c0b15de57e52026c951_JaffaCakes118

  • Size

    5.9MB

  • MD5

    a8b8d2d332118c0b15de57e52026c951

  • SHA1

    d3088b2cc2bdab9a028185be235ae024be2c973d

  • SHA256

    43e985f32eeabc6170230a836de87ca3ad4e506cbe6391856046afc1f99e359d

  • SHA512

    c879548df96e1d579aa3467c06d9b5188950626618a9f3a743f0dac718e05e6b5aee467a26ad4346da5903fbb887dfba132d7eebc5bdf215729a2cd54be83303

  • SSDEEP

    98304:UMHPL8Nbd34iF0H2yvC8fGUDmlizJ0IekjEyG8kL2fkBGzQqRpuXF7pu:UYYhd34ybUDciwkZy4TEqfuppu

Score
8/10
upx

Malware Config

Signatures

  • Patched UPX-packed file 5 IoCs

    Sample is packed with UPX but required header fields are zeroed out to prevent unpacking with the default UPX tool.

  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Requests dangerous framework permissions 4 IoCs

Files

  • a8b8d2d332118c0b15de57e52026c951_JaffaCakes118
    .apk android arch:arm

    com.tommy.mjtt.business

    com.tommy.mjtt.business.view.WelcomeActivity


Android Permissions

a8b8d2d332118c0b15de57e52026c951_JaffaCakes118

Permissions

android.permission.INTERNET

android.permission.ACCESS_NETWORK_STATE

android.permission.CHANGE_WIFI_STATE

android.permission.ACCESS_WIFI_STATE

android.permission.READ_PHONE_STATE

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.ACCESS_COARSE_LOCATION

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.READ_LOGS