General

  • Target

    139469bc35124b11ea955c4fcd577013_JaffaCakes118

  • Size

    20.4MB

  • MD5

    139469bc35124b11ea955c4fcd577013

  • SHA1

    246aa1fc79f0b82046b23d2ba8d1b2dd63cf3182

  • SHA256

    3463f2bf09900e924cd2dc0acb1a4ca89e37c74122425c43526dce9aa7a53b6a

  • SHA512

    6ac61abad9d2f96b9119b937f9c635305f229e22d7b90c55fd79534671e0584204d507cd139c86ab2ac6650f47dbd62596c68b6a358365f0ebcdcd518a145942

  • SSDEEP

    393216:+ZyS5xEFZ8YPOClYU6CWTjyoZcUIti3obKETR0+C79wlCaFYdLrOaVtjt7a4aOAH:+ZZ5aFZ8YPpaCWTe1gkKEt0RZvpTNtb6

Score
10/10

Malware Config

Signatures

  • Irata family
  • Irata payload 4 IoCs
  • Requests dangerous framework permissions 3 IoCs
  • HTTP links in PDF interactive object 2 IoCs

    Detects HTTP links in interactive objects within PDF files.

Files

  • 139469bc35124b11ea955c4fcd577013_JaffaCakes118
    .apk android

    com.appmaker.appmaker

    .main


  • cxt.tpl
    .apk android

    com.myapp.exs

    .main


  • pdfapp.aspx
    .apk android

    com.appmaker.testpdf

    .main


  • websiteapp.aspx
    .apk android

    com.appmaker.testappsx

    .main


Android Permissions

139469bc35124b11ea955c4fcd577013_JaffaCakes118

Permissions

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.INTERNET

com.android.vending.BILLING

android.permission.VIBRATE

android.permission.READ_PHONE_STATE

android.permission.ACCESS_WIFI_STATE

android.permission.READ_EXTERNAL_STORAGE