General

  • Target

    dbc907233dd7ebdf04212e2f3be721cd_JaffaCakes118

  • Size

    13.9MB

  • MD5

    dbc907233dd7ebdf04212e2f3be721cd

  • SHA1

    bb875ba70803f51334b401b41f2c9ab75d9f6317

  • SHA256

    23d5f4da7b4ea23a1def944bfda87d0c5fa0e131a39a991282eae3adb59abae0

  • SHA512

    b0080455e888e75481fb7e82d93c778d2164dcf22fe579ffd42d1d0c5e007bba33cce7df0be9a8f1aef183c7e24f7628ca9db1e10a306455caf217761e8b0aba

  • SSDEEP

    393216:aRs7Uq8wSQzvHW3sxdxIVlG4XSIWzxrSgSPfr85:Eq8izv2rVBCIUGggfo5

Score
8/10
upx

Malware Config

Signatures

  • Patched UPX-packed file 5 IoCs

    Sample is packed with UPX but required header fields are zeroed out to prevent unpacking with the default UPX tool.

  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Requests dangerous framework permissions 7 IoCs

Files

  • dbc907233dd7ebdf04212e2f3be721cd_JaffaCakes118
    .apk android arch:arm

    com.idearhanyu.maplecharging

    com.cooldingsoft.chargepoint.activity.guide.SplashActivity


Android Permissions

dbc907233dd7ebdf04212e2f3be721cd_JaffaCakes118

Permissions

android.permission.READ_LOGS

android.permission.CALL_PHONE

android.permission.INTERNET

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.READ_PHONE_STATE

android.permission.ACCESS_NETWORK_STATE

android.permission.ACCESS_WIFI_STATE

android.permission.CHANGE_WIFI_STATE

android.permission.ACCESS_COARSE_LOCATION

android.permission.ACCESS_FINE_LOCATION

android.permission.ACCESS_LOCATION_EXTRA_COMMANDS

android.permission.BLUETOOTH

android.permission.BLUETOOTH_ADMIN

android.permission.CAMERA

android.permission.READ_EXTERNAL_STORAGE

android.permission.MOUNT_UNMOUNT_FILESYSTEMS

android.permission.GET_TASKS