General

  • Target

    d283cb33570145d972486af35150c47e_JaffaCakes118

  • Size

    7.9MB

  • MD5

    d283cb33570145d972486af35150c47e

  • SHA1

    cf7e1d1014c7211be538f972fd77677755f77289

  • SHA256

    29bda439d041d2ad6e89b911e8a32df5ff24e1a0e0e382e089054feb79fe0b7e

  • SHA512

    df383021f66360f44680ccf24b0660468a6c5cf64a9f6e621baf37c1f6f3251623bc4321b5830995a9fd81ad1498604d03d05cb84a4807ecf05a9e5f07802d44

  • SSDEEP

    196608:10rMyUgBLHX94bnNFWO9AvkKZfh8djIssQ5M5RCMvIemaL:1oLLHXGnNF+iRZsQ5aPHL

Score
6/10

Malware Config

Signatures

  • Requests dangerous framework permissions 9 IoCs
  • HTTP links in PDF interactive object 1 IoCs

    Detects HTTP links in interactive objects within PDF files.

Files

  • d283cb33570145d972486af35150c47e_JaffaCakes118
    .apk android arch:arm64 arch:arm

    com.tjs

    com.tjs.LoadingActivity


Android Permissions

d283cb33570145d972486af35150c47e_JaffaCakes118

Permissions

android.permission.CHANGE_CONFIGURATION

android.permission.ACCESS_DOWNLOAD_MANAGER

android.permission.RAISED_THREAD_PRIORITY

android.permission.READ_PROFILE

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.READ_PHONE_STATE

android.permission.MOUNT_UNMOUNT_FILESYSTEMS

android.permission.KILL_BACKGROUND_PROCESSES

android.permission.RESTART_PACKAGES

android.permission.INTERNET

android.permission.ACCESS_NETWORK_STATE

android.permission.CHANGE_WIFI_STATE

android.permission.ACCESS_WIFI_STATE

android.permission.READ_LOGS

android.permission.CALL_PHONE

android.permission.SEND_SMS

android.permission.READ_SMS

android.permission.WAKE_LOCK

android.permission.VIBRATE

android.permission.SYSTEM_ALERT_WINDOW

android.permission.READ_CONTACTS

android.permission.FLASHLIGHT

android.permission.GET_TASKS

android.permission.ACCESS_LOCATION_EXTRA_COMMANDS

com.tjs.permission.JPUSH_MESSAGE

android.permission.JPUSH_MESSAGE

android.permission.RECEIVE_USER_PRESENT

android.permission.READ_EXTERNAL_STORAGE

android.permission.WRITE_SETTINGS