General

  • Target

    b2975d31fc7093a42450e4388622b13f_JaffaCakes118

  • Size

    120KB

  • MD5

    b2975d31fc7093a42450e4388622b13f

  • SHA1

    9778d65c069303b4abfb4146e9698831913b5852

  • SHA256

    8fbaacfa47ad8b0931424eb106cec8cd4163d182a55f8451fad60eb35466f6a6

  • SHA512

    464cef74fcd36a9b814ba23f54e600862dff315e31d3b2905e1e390346e2e79f46061dca22bfc988b047efc5421582807195e38c6168d42cd50b6af149db78cf

  • SSDEEP

    3072:4BayZi+qzo0uCCTyahU63D2Wn9o4vamgFI9V8fKsavJ47Bz:tAj0uCCTyahU3WnVymfV+KsavJ47t

Score
10/10

Malware Config

Signatures

  • Irata family
  • Irata payload 1 IoCs
  • Requests dangerous framework permissions 1 IoCs

Files

  • b2975d31fc7093a42450e4388622b13f_JaffaCakes118
    .apk android

    com.appmaker.testappsx

    .main


Android Permissions

b2975d31fc7093a42450e4388622b13f_JaffaCakes118

Permissions

android.permission.INTERNET

android.permission.READ_EXTERNAL_STORAGE