General
-
Target
cf7a6d81e5457e2032e4768e1226d3ff_JaffaCakes118
-
Size
6.0MB
-
Sample
240405-k4kcfsge94
-
MD5
cf7a6d81e5457e2032e4768e1226d3ff
-
SHA1
7eaccab9ca44c4bdad4e291e2744c343dd864ea7
-
SHA256
a852e4875a8bb3d4e3ebf175766f58325575ed4d691548415fd4b662dac18f9e
-
SHA512
3eb336c083867cd514e86681f79ca003970b0e07067e0e6e447778135a4381fa094769bd8f93f542485afe9ae3b8e9e1dd6fa90ced5d909196f45bc8e9e176ad
-
SSDEEP
196608:y59SNNGQg56l+dQV4EhWnsQbVC0s9dz9MogxZ:y59SNNGQBV4nsQbVhaneZ
Static task
static1
Behavioral task
behavioral1
Sample
cf7a6d81e5457e2032e4768e1226d3ff_JaffaCakes118.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
libgpc-1.0.0.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral3
Sample
libgpc-1.0.0.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral4
Sample
libgpc-1.0.0.apk
Resource
android-x64-arm64-20240221-en
Malware Config
Targets
-
-
Target
cf7a6d81e5457e2032e4768e1226d3ff_JaffaCakes118
-
Size
6.0MB
-
MD5
cf7a6d81e5457e2032e4768e1226d3ff
-
SHA1
7eaccab9ca44c4bdad4e291e2744c343dd864ea7
-
SHA256
a852e4875a8bb3d4e3ebf175766f58325575ed4d691548415fd4b662dac18f9e
-
SHA512
3eb336c083867cd514e86681f79ca003970b0e07067e0e6e447778135a4381fa094769bd8f93f542485afe9ae3b8e9e1dd6fa90ced5d909196f45bc8e9e176ad
-
SSDEEP
196608:y59SNNGQg56l+dQV4EhWnsQbVC0s9dz9MogxZ:y59SNNGQBV4nsQbVhaneZ
Score8/10-
Queries information about running processes on the device.
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Listens for changes in the sensor environment (might be used to detect emulation)
-
-
-
Target
libgpc-1.0.0.so
-
Size
67KB
-
MD5
fe89f8caffa17949a4037df6bf871406
-
SHA1
94a29e93d688217440270cf7e8cae16c9addc434
-
SHA256
a75233056d06b68a3d81fdc8337723d1404d6522c8bde88f9be2ee4fc5cb43da
-
SHA512
43f340876eb9fa97831499f883ea1939e6c56b19ef9bef2d2c3d0da7bfad07c33e79a9ff1169a8e9b712ba82c89036cb1af8bf5721f86c82376bd3fc36d79db6
-
SSDEEP
1536:s2UrVBtGzcdo95r8nZnbpJjxj5QGPvOSxKKBNgAqHi:s2UrTMio95qdpxpbWwvgAv
Score1/10 -