General

  • Target

    e9d0a4e0f688aa575699b623c9cb655c_JaffaCakes118

  • Size

    16.0MB

  • MD5

    e9d0a4e0f688aa575699b623c9cb655c

  • SHA1

    f4be88da5b2dfb0e5f81ee040dd18275e50d32e3

  • SHA256

    9c4fda293acbd460608ce4f46d75be94a008f44b21f2f47097cc411f905a9410

  • SHA512

    0577701dcbc6ab093249a6da8522543e883bbd9195af2a0e88ce9a448d5dce40a570615129ddff4ce97b39bb9b511c10a99e7932b031ca68f20c9aab5fa8cbb5

  • SSDEEP

    393216:8KmqaLPoP/2GMWfRBfmut2xK6i+cNUWQI12:8OajoPXauwtieu12

Score
8/10
upx

Malware Config

Signatures

  • Patched UPX-packed file 2 IoCs

    Sample is packed with UPX but required header fields are zeroed out to prevent unpacking with the default UPX tool.

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Requests dangerous framework permissions 7 IoCs

Files

  • e9d0a4e0f688aa575699b623c9cb655c_JaffaCakes118
    .apk android arch:arm

    com.cdjysd.stopstop

    com.cdjysd.stopstop.WelcomActivity


Android Permissions

e9d0a4e0f688aa575699b623c9cb655c_JaffaCakes118

Permissions

android.permission.READ_LOGS

android.permission.CAMERA

android.permission.RECORD_AUDIO

android.permission.VIBRATE

android.permission.SEND_SMS

android.permission.MOUNT_UNMOUNT_FILESYSTEMS

android.permission.INTERNET

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.ACCESS_NETWORK_STATE

android.permission.ACCESS_WIFI_STATE

android.permission.READ_PHONE_STATE

android.permission.ACCESS_COARSE_LOCATION

android.permission.ACCESS_FINE_LOCATION

android.permission.CHANGE_WIFI_STATE

android.permission.ACCESS_LOCATION_EXTRA_COMMANDS