General

  • Target

    c0c24ea91977be8235890be987bf89d5_JaffaCakes118

  • Size

    31.2MB

  • MD5

    c0c24ea91977be8235890be987bf89d5

  • SHA1

    f1bbfcc740791066219ad35349980b9ab593a9ac

  • SHA256

    759810960fb8b880422ea470a83b89c5f9e7ca4b7d340d3e0653f3dd5609f779

  • SHA512

    5d5037cabd8dd9532121af290427eac17b1639fcbcd77bd67b6854f0835fd7f857159c51865cf20b32254fac17b3df49bc0b671fc49791795c361c03e0fec577

  • SSDEEP

    786432:pOayc/fVtl4S2hNYT1CrUFAsxKzya4z+wSpW7EOCD:Qayof3lIoT1ymKzhW7A

Score
8/10
upx

Malware Config

Signatures

  • Patched UPX-packed file 2 IoCs

    Sample is packed with UPX but required header fields are zeroed out to prevent unpacking with the default UPX tool.

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Requests dangerous framework permissions 8 IoCs

Files

  • c0c24ea91977be8235890be987bf89d5_JaffaCakes118
    .apk android arch:arm arch:x86

    com.izaodao.gm

    com.izaodao.gm.feature.splash.SplashActivity


Android Permissions

c0c24ea91977be8235890be987bf89d5_JaffaCakes118

Permissions

android.permission.CAMERA

android.permission.READ_CONTACTS

android.permission.ACCESS_FINE_LOCATION

android.permission.ACCESS_COARSE_LOCATION

android.permission.READ_PHONE_STATE

android.permission.READ_EXTERNAL_STORAGE

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.ACCESS_WIFI_STATE

android.permission.ACCESS_NETWORK_STATE

android.permission.INTERNET

android.permission.WAKE_LOCK

com.android.launcher.permission.INSTALL_SHORTCUT

android.permission.SYSTEM_ALERT_WINDOW

android.permission.SYSTEM_OVERLAY_WINDOW

android.permission.VIBRATE

android.permission.CHANGE_WIFI_STATE

android.permission.ACCESS_GPS

getui.permission.GetuiService.com.bmdoctor.jyt

android.permission.ACCESS_LOCATION_EXTRA_COMMANDS

com.google.android.c2dm.permission.RECEIVE

com.izaodao.gm.permission.C2D_MESSAGE

android.permission.MOUNT_UNMOUNT_FILESYSTEMS