General

  • Target

    c8d631383b1b6d099686afb4982c4797_JaffaCakes118

  • Size

    16.0MB

  • MD5

    c8d631383b1b6d099686afb4982c4797

  • SHA1

    61eba8e941b03f6ead3562ab73bf3d2bf6b0f949

  • SHA256

    0f2190e4f047a1be42844e8521c65060772a4bb119861872529fa18718fdd418

  • SHA512

    1946bde96bf38b9a9d1114dca1b0c20ad0f8a3220efdad1b886274f56fc13364f99c5c369be376bd411273e68a0e9cf718cd6e5e175df0a040fc6f491311b9a2

  • SSDEEP

    393216:29eHJtIntXany9oT+ouN8hH454foU2X+2glJvr1b/kM9e+:2EtqXanGoT+ou0Y54f8X1wJ9n9D

Score
6/10

Malware Config

Signatures

  • Declares services with permission to bind to the system 1 IoCs
  • Requests dangerous framework permissions 3 IoCs

Files

  • c8d631383b1b6d099686afb4982c4797_JaffaCakes118
    .apk android arch:arm arch:arm64 arch:x86 arch:x64

    com.applisto.appcloner

    com.applisto.appcloner.StartActivity


Android Permissions

c8d631383b1b6d099686afb4982c4797_JaffaCakes118

Permissions

android.permission.INTERNET

android.permission.ACCESS_NETWORK_STATE

android.permission.USE_FINGERPRINT

android.permission.READ_EXTERNAL_STORAGE

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.REQUEST_INSTALL_PACKAGES

android.permission.VIBRATE

com.android.vending.BILLING

android.permission.WAKE_LOCK

com.applisto.appcloner.permission.DEFAULT

com.android.launcher.permission.INSTALL_SHORTCUT

com.google.android.finsky.permission.BIND_GET_INSTALL_REFERRER_SERVICE

com.google.android.c2dm.permission.RECEIVE

com.android.vending.CHECK_LICENSE