General

  • Target

    cea28ba97f5cf4f10b06870769d17b00_JaffaCakes118

  • Size

    13.4MB

  • MD5

    cea28ba97f5cf4f10b06870769d17b00

  • SHA1

    ae1b2e52d6bd0013a56a5141b3c6239ad28752ed

  • SHA256

    9b5dd92df1f44ed30d198fec1229f32ca0fee00653d1fb7e171cb76775abe584

  • SHA512

    e16ea10f75649ccb8dfac910f0a6b0156ffd750c0ddd491216e6c285bc90fb51fa55fbdafedf29bf282a4fed938f356e0817276e1261bb1b83f341b080949003

  • SSDEEP

    196608:0otzFJhDJjaEA8kpgaRafQZdvOMWL7Z3rDhGaBDuF95yspVgvjcc+lFOe:0mThNjan5MWdmV73CF9vpCcb3

Score
8/10
upx

Malware Config

Signatures

  • Patched UPX-packed file 1 IoCs

    Sample is packed with UPX but required header fields are zeroed out to prevent unpacking with the default UPX tool.

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Requests dangerous framework permissions 9 IoCs

Files

  • cea28ba97f5cf4f10b06870769d17b00_JaffaCakes118
    .apk android arch:arm

    io.binstream.github.demo

    com.jyzx8.fireplayer.SplashShowingActivity


Android Permissions

cea28ba97f5cf4f10b06870769d17b00_JaffaCakes118

Permissions

android.permission.INTERNET

android.permission.ACCESS_NETWORK_STATE

android.permission.ACCESS_WIFI_STATE

android.permission.READ_PHONE_STATE

android.permission.ACCESS_COARSE_LOCATION

android.permission.ACCESS_FINE_LOCATION

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.REQUEST_INSTALL_PACKAGES

android.permission.SYSTEM_ALERT_WINDOW

android.permission.CHANGE_WIFI_STATE

android.permission.READ_CALENDAR

android.permission.WRITE_CALENDAR

android.permission.SYSTEM_ALERT_WINDOW