General

  • Target

    b4a249c3910734fcec4136027c4f1e0a_JaffaCakes118

  • Size

    1.5MB

  • MD5

    b4a249c3910734fcec4136027c4f1e0a

  • SHA1

    1c77e7e582586db009d115a1a7ec623db53af6d8

  • SHA256

    f891f6b27c8e6ea9833b5cb1b2a5a7f66ec127cc6c5bc89b07143aba61aa5c58

  • SHA512

    56810ac87190b831df205393219875f3064948ed8fecf6e141bcccd5a792f7e31ba316bb6f62948f86426b7d43b009ea95f860bbfac536f0ad6caae8d10c0a0e

  • SSDEEP

    24576:HYw+aj13UR7rfR52fG7+05P5wlXTYKZ3sn28iCJWcrBmN/KR69eb:TWRHqmPPaq28F9G9wb

Score
6/10

Malware Config

Signatures

  • Requests dangerous framework permissions 8 IoCs

Files

  • b4a249c3910734fcec4136027c4f1e0a_JaffaCakes118
    .apk android

    cc.freecall.ipcall

    .activity.WelcomeActivity


  • alipay_plugin223_0309.apk
    .apk android

    com.alipay.android.app

    .Cashier


Android Permissions

b4a249c3910734fcec4136027c4f1e0a_JaffaCakes118

Permissions

android.permission.CHANGE_CONFIGURATION

android.permission.MODIFY_PHONE_STATE

android.permission.READ_CONTACTS

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.MOUNT_UNMOUNT_FILESYSTEMS

android.permission.CALL_PHONE

android.permission.VIBRATE

android.permission.ACCESS_WIFI_STATE

android.permission.PROCESS_OUTGOING_CALLS

android.permission.ACCESS_NETWORK_STATE

android.permission.INTERNET

android.permission.READ_PHONE_STATE

android.permission.READ_LOGS

com.android.launcher.permission.INSTALL_SHORTCUT

com.android.launcher.permission.UNINSTALL_SHORTCUT

android.permission.SEND_SMS

android.permission.SYSTEM_ALERT_WINDOW

android.permission.SYSTEM_OVERLAY_WINDOW

android.permission.WRITE_CONTACTS