General

  • Target

    ec04e230b2e79a8470fcf09ba49f5f44_JaffaCakes118

  • Size

    10.2MB

  • MD5

    ec04e230b2e79a8470fcf09ba49f5f44

  • SHA1

    70e8e4f5c28173bb07911106aafc55295f374eea

  • SHA256

    6fabb849a21e74157da1e88f68c526ad830a6919657775e4f1cbf1920adfa8c2

  • SHA512

    436c7fe18eeca48653e5e1d61a1a8bb526220d93b1b295e5cb5c1a4901475eab1e54fe042a06f6b0e802dbfe521fd7cb6965081227373710b14234df7b28e7c8

  • SSDEEP

    196608:ckEF0nYpAlrT7iB/0h0VDXAk1e1/nsEWN5SVw6MZ4jPtT3YATg0q3fSTyZD3Ow:HysAorUW6cvsEW6V5MWhDT9qPSWZCw

Score
6/10

Malware Config

Signatures

  • Declares services with permission to bind to the system 1 IoCs
  • Requests dangerous framework permissions 3 IoCs

Files

  • ec04e230b2e79a8470fcf09ba49f5f44_JaffaCakes118
    .apk android arch:arm64 arch:arm

    com.qiiiqjk.kkanzh

    com.yxcorp.activity.WelComeActivity


Android Permissions

ec04e230b2e79a8470fcf09ba49f5f44_JaffaCakes118

Permissions

android.permission.READ_EXTERNAL_STORAGE

android.permission.GET_TASKS

android.permission.INTERNET

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.ACCESS_NETWORK_STATE

android.permission.INTERNET

android.permission.ACCESS_NETWORK_STATE

android.permission.READ_PHONE_STATE