General

  • Target

    dba3b08a786a24268a6f36e86bed69f3_JaffaCakes118

  • Size

    16.3MB

  • MD5

    dba3b08a786a24268a6f36e86bed69f3

  • SHA1

    398aa9eed7998646f068bb106387ede7b1cab5d0

  • SHA256

    0bc577bacd30f448b4e4b76d13472bf17b0fc283806a1412295191c7592ec269

  • SHA512

    cdb394d0e471077f2d4ea9202b3ab23899c4199a709334c918b9df0c4c022cfb77880e8843d6e326219bdd99e7371391135a9c4a7b534c823c117b0a18a2b14f

  • SSDEEP

    393216:v47mhyzOEk1BWC+WoeiVTpQP+MQP++4Zv+6xrS1T6+v:JhyzOEoBWC+WOQ2MQ2+4ZvhrSpjv

Score
8/10
upx

Malware Config

Signatures

  • Patched UPX-packed file 3 IoCs

    Sample is packed with UPX but required header fields are zeroed out to prevent unpacking with the default UPX tool.

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Requests dangerous framework permissions 7 IoCs

Files

  • dba3b08a786a24268a6f36e86bed69f3_JaffaCakes118
    .apk android arch:arm arch:x64

    com.ainiu.parent

    com.ainiu.home.SplashActivity


Android Permissions

dba3b08a786a24268a6f36e86bed69f3_JaffaCakes118

Permissions

android.permission.INTERNET

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.MOUNT_UNMOUNT_FILESYSTEMS

android.permission.ACCESS_NETWORK_STATE

android.permission.ACCESS_WIFI_STATE

android.permission.READ_PHONE_STATE

android.permission.CAMERA

android.permission.BLUETOOTH

android.permission.BLUETOOTH_ADMIN

android.permission.ACCESS_FINE_LOCATION

android.permission.ACCESS_COARSE_LOCATION

android.permission.CHANGE_WIFI_STATE

android.permission.WAKE_LOCK

android.permission.RECEIVE_BOOT_COMPLETED

android.permission.VIBRATE

android.permission.GET_TASKS

android.permission.SYSTEM_ALERT_WINDOW

getui.permission.GetuiService.com.ainiu.parent

android.permission.READ_EXTERNAL_STORAGE