General

  • Target

    278d2b95cff34d864405615ec90d426e_JaffaCakes118

  • Size

    2.6MB

  • MD5

    278d2b95cff34d864405615ec90d426e

  • SHA1

    399ae02e7a47f58b753fc210b3c1ab63f54b4a8c

  • SHA256

    fa09b9c5ba1a1ba5a445824778ff821552f93a35f039b76aedc0de56ecded0fa

  • SHA512

    a6bb6bba4143dc0b4b8eb666bba9ab30c6fc3ed26b07ffce973eb7f4c96f6200699eb5935e40c61c0fd3a08a985aded5ece23257ccfd658175d5ef773aa86055

  • SSDEEP

    49152:vW4CjoDo5F0OQS66gD2JM9SNK7fhTwIt3HQwsjoNQKvdSgkZs:e40oDWwj6g647aoA0Z7cs

Score
8/10
upx

Malware Config

Signatures

  • Patched UPX-packed file 1 IoCs

    Sample is packed with UPX but required header fields are zeroed out to prevent unpacking with the default UPX tool.

  • Requests dangerous framework permissions 8 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • 278d2b95cff34d864405615ec90d426e_JaffaCakes118
    .apk android arch:arm

    com.android.brazze

    com.android.tentna.activity.MainActivity


Android Permissions

278d2b95cff34d864405615ec90d426e_JaffaCakes118

Permissions

android.permission.SYSTEM_ALERT_WINDOW

android.permission.CHANGE_WIFI_STATE

android.permission.CHANGE_NETWORK_STATE

android.permission.BLUETOOTH

android.permission.BLUETOOTH_ADMIN

android.permission.ACCESS_NETWORK_STATE

android.permission.ACCESS_WIFI_STATE

android.permission.GET_TASKS

android.permission.READ_PHONE_STATE

android.permission.INTERNET

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.READ_LOGS

android.permission.VIBRATE

android.permission.ACCESS_COARSE_LOCATION

android.permission.ACCESS_FINE_LOCATION

android.permission.WRITE_SETTINGS

android.permission.CHANGE_CONFIGURATION

android.permission.ACCESS_FINE_LOCATION

android.permission.CAMERA

android.permission.KILL_BACKGROUND_PROCESSES