General

  • Target

    e25bb1c379894bcf73a42e2e55148a64_JaffaCakes118

  • Size

    18.2MB

  • MD5

    e25bb1c379894bcf73a42e2e55148a64

  • SHA1

    6e6c7d2e4f79055c85296334dac06caa44f6c32f

  • SHA256

    c188e9895fc1a6804d84b474cf066efcd1a5d96dba9ac39ea73737abe0b63ee0

  • SHA512

    57f02c43d063b8cf6c00382e06a26d1adb6e6b2675d7cf0cb89c36565e5f9a6790543fb9fc6c43cb972d10ade9155d723b3bfc664cf0bc54e4b01df08ce74931

  • SSDEEP

    393216:KKmqaLkCqiYNQzv0RogP9STlcT5MilcT5MDhTAK+LWYIsFkBeeMS:KOanqV+zsz9+C5MWC5MNTAfWYIIkrb

Score
8/10
upx

Malware Config

Signatures

  • Patched UPX-packed file 3 IoCs

    Sample is packed with UPX but required header fields are zeroed out to prevent unpacking with the default UPX tool.

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Requests dangerous framework permissions 18 IoCs

Files

  • e25bb1c379894bcf73a42e2e55148a64_JaffaCakes118
    .apk android arch:arm arch:x86

    io.dcloud.H57C7C076

    io.dcloud.PandoraEntry


Android Permissions

e25bb1c379894bcf73a42e2e55148a64_JaffaCakes118

Permissions

android.permission.INTERNET

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.ACCESS_NETWORK_STATE

android.permission.CHANGE_NETWORK_STATE

android.permission.ACCESS_WIFI_STATE

android.permission.GET_TASKS

android.permission.ACCESS_COARSE_LOCATION

android.permission.ACCESS_FINE_LOCATION

android.permission.CALL_PHONE

android.permission.CAMERA

android.permission.CHANGE_WIFI_STATE

android.permission.GET_TOP_ACTIVITY_INFO

android.permission.MOUNT_UNMOUNT_FILESYSTEMS

android.permission.READ_EXTERNAL_STORAGE

android.permission.READ_LOGS

android.permission.READ_PHONE_STATE

android.permission.RECEIVE_BOOT_COMPLETED

android.permission.SYSTEM_ALERT_WINDOW

android.permission.USE_FINGERPRINT

android.permission.VIBRATE

android.permission.WAKE_LOCK

android.permission.WRITE_SETTINGS

android.permission.RECEIVE_USER_PRESENT

com.android.launcher.permission.UNINSTALL_SHORTCUT

com.huawei.android.launcher.permission.CHANGE_BADGE

com.android.launcher.permission.INSTALL_SHORTCUT

com.android.launcher.permission.READ_SETTINGS

com.android.launcher2.permission.READ_SETTINGS

com.android.launcher3.permission.READ_SETTINGS

com.yulong.android.launcherL.permission.READ_SETTINGS

com.meizu.flyme.launcher.permission.READ_SETTINGS

com.bbk.launcher2.permission.READ_SETTINGS

com.oppo.launcher.permission.READ_SETTINGS

com.htc.launcher.permission.READ_SETTINGS

com.qiku.launcher.permission.READ_SETTINGS

com.huawei.android.launcher.permission.READ_SETTINGS

com.zte.mifavor.launcher.permission.READ_SETTINGS

com.lenovo.launcher.permission.READ_SETTINGS

com.google.android.launcher.permission.READ_SETTINGS

com.yulong.android.launcher3.READ_SETTINGS

org.adw.launcher.permission.READ_SETTINGS

com.qihoo360.launcher.permission.READ_SETTINGS

com.lge.launcher.permission.READ_SETTINGS

net.qihoo.launcher.permission.READ_SETTINGS

org.adwfreak.launcher.permission.READ_SETTINGS

org.adw.launcher_donut.permission.READ_SETTINGS

com.huawei.launcher3.permission.READ_SETTINGS

com.fede.launcher.permission.READ_SETTINGS

com.sec.android.app.twlauncher.settings.READ_SETTINGS

com.tencent.qqlauncher.permission.READ_SETTINGS