General

  • Target

    aa51056a52459bc6b24879ffa7fc1351_JaffaCakes118

  • Size

    18.0MB

  • MD5

    aa51056a52459bc6b24879ffa7fc1351

  • SHA1

    b0e2ad6409b4dab86662e46f25fc38cb7503ad33

  • SHA256

    095d25a15037e2c0dd2b2d09490f555705c1c1a7435ab6080ac6be7068f0d2d8

  • SHA512

    d3a4ec4c17bb0c610e51eeda239251eba3484011b6a542d5a791d0d51ad5958c48dad90e538ffb1766b6b528a498bf4feaf40a17c1e121937a8cc46d4ff2c81f

  • SSDEEP

    393216:tP4HqukHYaXVZHGA18vttxbwNj4Al30ntgD5mnegg:14lk42JGzvttuNBlEGmegg

Score
6/10

Malware Config

Signatures

  • Requests dangerous framework permissions 10 IoCs

Files

  • aa51056a52459bc6b24879ffa7fc1351_JaffaCakes118
    .apk android arch:arm

    com.jjwxc.reader

    com.example.jinjiangshucheng.AppStart


Android Permissions

aa51056a52459bc6b24879ffa7fc1351_JaffaCakes118

Permissions

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.READ_EXTERNAL_STORAGE

android.permission.WAKE_LOCK

android.permission.REORDER_TASKS

android.permission.ACCESS_WIFI_STATE

android.permission.REQUEST_INSTALL_PACKAGES

android.permission.GET_TASKS

android.permission.BROADCAST_STICKY

android.permission.CAMERA

android.permission.READ_PHONE_STATE

android.permission.INTERNET

android.permission.ACCESS_NETWORK_STATE

android.permission.USE_FULL_SCREEN_INTENT

com.jjwxc.reader.permission.JPUSH_MESSAGE

android.permission.RECEIVE_USER_PRESENT

android.permission.WRITE_SETTINGS

android.permission.MOUNT_UNMOUNT_FILESYSTEMS

android.permission.VIBRATE

android.permission.SYSTEM_ALERT_WINDOW

android.permission.ACCESS_COARSE_LOCATION

android.permission.CHANGE_WIFI_STATE

android.permission.ACCESS_FINE_LOCATION

android.permission.ACCESS_BACKGROUND_LOCATION

android.permission.ACCESS_LOCATION_EXTRA_COMMANDS

android.permission.CHANGE_NETWORK_STATE