General

  • Target

    17f9b28299e7e83e62c0c10432522f72_JaffaCakes118

  • Size

    5.7MB

  • MD5

    17f9b28299e7e83e62c0c10432522f72

  • SHA1

    4607a89e9305ffc41db9d1f132db67cf59eb8655

  • SHA256

    b4296a77f74cfcb3234d274d5592df9f48c460ad5dc58fc2b6753fe6702a96c6

  • SHA512

    18c1bfa651188b6f1a72841cb2a0ebbaaffbc7905ebeb6d0f50f38fb357beb708d84a0b5fcabd496e577c0a74ac3916e92558c543b8c95518d4aa070e298fd44

  • SSDEEP

    98304:HHBVmWX9SCz+NjusagC4PcoAmVSGabfSTO3uHTkfZMhpITwRpOgnHbsn:HH6WiNS/poAmVeragfyYUOgHm

Score
6/10

Malware Config

Signatures

  • Declares services with permission to bind to the system 1 IoCs
  • Requests dangerous framework permissions 3 IoCs

Files

  • 17f9b28299e7e83e62c0c10432522f72_JaffaCakes118
    .apk android

    com.optim.tools

    com.optimize.treasure.activity.SplashActivity


Android Permissions

17f9b28299e7e83e62c0c10432522f72_JaffaCakes118

Permissions

android.permission.INTERNET

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.READ_EXTERNAL_STORAGE

android.permission.KILL_BACKGROUND_PROCESSES

android.permission.ACCESS_NETWORK_STATE

android.permission.ACCESS_WIFI_STATE

android.permission.READ_PHONE_STATE