General

  • Target

    be9baef54546e28346c824c1a04f0578_JaffaCakes118

  • Size

    17.7MB

  • MD5

    be9baef54546e28346c824c1a04f0578

  • SHA1

    05327529dfee2519e8db2e1c2dfa486fd120f0a6

  • SHA256

    d2dfc4d1707426e2be43aca4eaa60e7f8cd961f6f6d74fdf5ec8805a50126d42

  • SHA512

    03a4497ef7d14bb6e74065db343c3b6948835938c51fa33a4adf6dbd3ec1b0b026a1c6b4551b8c935fefd12e82db8bb1313e199e8b74397d4c5d518b5ab7cae3

  • SSDEEP

    393216:17j6c692qrX7289hIEVCYxoQPVsQxoQPVi38mD1:h6LjIGCYWevWeipp

Score
8/10
upx

Malware Config

Signatures

  • Patched UPX-packed file 3 IoCs

    Sample is packed with UPX but required header fields are zeroed out to prevent unpacking with the default UPX tool.

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Requests dangerous framework permissions 8 IoCs

Files

  • be9baef54546e28346c824c1a04f0578_JaffaCakes118
    .apk android arch:arm64 arch:arm

    com.zxshare.xingcustomer

    com.zxshare.xingcustomer.ui.authorize.SplashActivity


Android Permissions

be9baef54546e28346c824c1a04f0578_JaffaCakes118

Permissions

com.zxshare.xingcustomer.permission.JPUSH_MESSAGE

android.permission.RECEIVE_USER_PRESENT

android.permission.READ_EXTERNAL_STORAGE

android.permission.SYSTEM_ALERT_WINDOW

android.permission.CHANGE_NETWORK_STATE

android.permission.GET_TASKS

android.permission.VIBRATE

android.permission.WAKE_LOCK

android.permission.MOUNT_UNMOUNT_FILESYSTEMS

android.permission.WRITE_SETTINGS

android.permission.CAMERA

android.permission.ACCESS_COARSE_LOCATION

android.permission.ACCESS_FINE_LOCATION

android.permission.ACCESS_NETWORK_STATE

android.permission.ACCESS_WIFI_STATE

android.permission.CHANGE_WIFI_STATE

android.permission.INTERNET

android.permission.READ_PHONE_STATE

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.ACCESS_LOCATION_EXTRA_COMMANDS

android.permission.BLUETOOTH

android.permission.BLUETOOTH_ADMIN