General
-
Target
f7337dd096685191614374d757b78e26_JaffaCakes118
-
Size
13.3MB
-
Sample
240418-edwpxabe3x
-
MD5
f7337dd096685191614374d757b78e26
-
SHA1
2faa70f38bfe5cd7efb2ea7be5720f18ff28b358
-
SHA256
93e18fa7a1ef9a9c4c98b60e4b952bf84461d851cd4a957fc96bcb8e9bb7b632
-
SHA512
4b85b7505a07f41a05f2a55af790c370f003380715702d394414bc19bfe3b9f84195e4f067b48c1b7308acbbf049e25f9768527cf594ec182a87bbb893e2e82a
-
SSDEEP
196608:yDDLrEVi3G93yAHXvNC7bCAb6QFdLOsFcsy67ZeX5Qc29eeTU:vmG91/07OAFOwcsy0BcT
Static task
static1
Behavioral task
behavioral1
Sample
f7337dd096685191614374d757b78e26_JaffaCakes118.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
f7337dd096685191614374d757b78e26_JaffaCakes118.apk
Resource
android-33-x64-arm64-20240229-en
Behavioral task
behavioral3
Sample
alipay_msp.apk
Resource
android-x86-arm-20240221-en
Malware Config
Targets
-
-
Target
f7337dd096685191614374d757b78e26_JaffaCakes118
-
Size
13.3MB
-
MD5
f7337dd096685191614374d757b78e26
-
SHA1
2faa70f38bfe5cd7efb2ea7be5720f18ff28b358
-
SHA256
93e18fa7a1ef9a9c4c98b60e4b952bf84461d851cd4a957fc96bcb8e9bb7b632
-
SHA512
4b85b7505a07f41a05f2a55af790c370f003380715702d394414bc19bfe3b9f84195e4f067b48c1b7308acbbf049e25f9768527cf594ec182a87bbb893e2e82a
-
SSDEEP
196608:yDDLrEVi3G93yAHXvNC7bCAb6QFdLOsFcsy67ZeX5Qc29eeTU:vmG91/07OAFOwcsy0BcT
Score1/10 -
-
-
Target
alipay_msp.apk
-
Size
354KB
-
MD5
89c04e1ebcd58eca6dd93211628ed0bc
-
SHA1
7d1e77ce25a635299704dbd95bd95c697572ea9d
-
SHA256
ee3c608fff51b313f4e0b3e542bedccb4d4db4c8eb44e63bf4be0d468e9ee117
-
SHA512
3dccaeff9906401855f3071c91012926d7e9250674ea0bb89606e4862223a8343fc7b9369afe4e50031d261b45437107c018f565da5615c49721c3bf1bf6ed01
-
SSDEEP
6144:cH8LfOo+BjGVN8TdW4zxgnm1Us3JuOK2vf5C8EcPK+WvyQcQ2fnq7:cHLxBiVN8pWggmlY25CLE8RcQ2fnq7
Score8/10-
Queries information about the current Wi-Fi connection.
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-