General

  • Target

    41b758dcaaa229dbe3f4359ff6a1ea02_JaffaCakes118

  • Size

    2.6MB

  • MD5

    41b758dcaaa229dbe3f4359ff6a1ea02

  • SHA1

    c682e803bc7c78a06053de317641e91353dcf5f6

  • SHA256

    21c7c6e2303325bf465c436523c04f9a89f4db5facb24a9ca2332ae311efd6a1

  • SHA512

    469ec5d1112b738a3bc6f18fa061849da7874df63c51b1471d752797eb3483fd4b82e2fb61506970c41387b1b6297b3d95c5124c3109e17b8d1b82b5bb997ea0

  • SSDEEP

    49152:vW4CjoDo5F0OQS66gD2JM9SNK7fhTwIt3HQwsjoNQKvdSgkZH:e40oDWwj6g647aoA0Z7cH

Score
8/10
upx

Malware Config

Signatures

  • Patched UPX-packed file 1 IoCs

    Sample is packed with UPX but required header fields are zeroed out to prevent unpacking with the default UPX tool.

  • Requests dangerous framework permissions 8 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • 41b758dcaaa229dbe3f4359ff6a1ea02_JaffaCakes118
    .apk android arch:arm

    com.android.brazze

    com.android.tentna.activity.MainActivity


Android Permissions

41b758dcaaa229dbe3f4359ff6a1ea02_JaffaCakes118

Permissions

android.permission.SYSTEM_ALERT_WINDOW

android.permission.CHANGE_WIFI_STATE

android.permission.CHANGE_NETWORK_STATE

android.permission.BLUETOOTH

android.permission.BLUETOOTH_ADMIN

android.permission.ACCESS_NETWORK_STATE

android.permission.ACCESS_WIFI_STATE

android.permission.GET_TASKS

android.permission.READ_PHONE_STATE

android.permission.INTERNET

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.READ_LOGS

android.permission.VIBRATE

android.permission.ACCESS_COARSE_LOCATION

android.permission.ACCESS_FINE_LOCATION

android.permission.WRITE_SETTINGS

android.permission.CHANGE_CONFIGURATION

android.permission.ACCESS_FINE_LOCATION

android.permission.CAMERA

android.permission.KILL_BACKGROUND_PROCESSES