General

  • Target

    874c0b0b83bebc26f97add209367a0a1_JaffaCakes118

  • Size

    17.3MB

  • MD5

    874c0b0b83bebc26f97add209367a0a1

  • SHA1

    fe9c1d056f11a8abd87da536e0a9a053c5228953

  • SHA256

    ee69c56db2b0f41f672a141ffc74180387cc1c60badab09b7b3d4338f05621b7

  • SHA512

    a2e599fcb30050c2837095ce05a39c0815fcdcc0d8d0b1ffbc6614f7fa044de526b43b0f738530f6ca164d1a16fc76b23ffd67cce7d7cbc42522c02869006b61

  • SSDEEP

    393216:TYNdz9qWAMZE/P75anpnOifJivJAMANeuQCO3fFtErZy6j1TpND0fKL3E:0Q+ZjpOio+MAGCO3tGrD3DE

Score
6/10

Malware Config

Signatures

  • Declares services with permission to bind to the system 1 IoCs
  • Requests dangerous framework permissions 5 IoCs

Files

  • 874c0b0b83bebc26f97add209367a0a1_JaffaCakes118
    .apk android arch:arm arch:x86

    com.bengigi.runcowrun

    .GameActivity


Android Permissions

874c0b0b83bebc26f97add209367a0a1_JaffaCakes118

Permissions

android.permission.INTERNET

android.permission.ACCESS_NETWORK_STATE

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.READ_EXTERNAL_STORAGE

android.permission.GET_ACCOUNTS

android.permission.READ_PHONE_STATE

android.permission.ACCESS_WIFI_STATE

com.android.vending.BILLING

com.bengigi.runcowrun.permission.C2D_MESSAGE

com.google.android.c2dm.permission.RECEIVE

android.permission.SYSTEM_ALERT_WINDOW