General
-
Target
0585eb4661b3cd5e8cd8558bdafa5551_JaffaCakes118
-
Size
18.2MB
-
Sample
240428-s4cllsbc5x
-
MD5
0585eb4661b3cd5e8cd8558bdafa5551
-
SHA1
038de821772f40e07c689e9715ec3eca2b3595b4
-
SHA256
1a5e3d80b1bbe0d7d4dedf1b94e6f1c9a708e1b7b6b94697b8f89539633fd331
-
SHA512
f20dad91a65fd1ec471790aebe585d0da555609ac418014fdf58b5bc5affe6cd8f2299aea65a506b922a1c6523720eaf926ed5356554856dae16b3f1713303ac
-
SSDEEP
393216:Gm2s3Ps7ePOTKpAqCbqyGzrdYk+AuXk3G/JXd9cAvfP/:GhsfsHbqCbqZzeBXiGFdCqfX
Static task
static1
Behavioral task
behavioral1
Sample
0585eb4661b3cd5e8cd8558bdafa5551_JaffaCakes118.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
seckeysdk.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral3
Sample
seckeysdk.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral4
Sample
seckeysdk.apk
Resource
android-x64-arm64-20240221-en
Behavioral task
behavioral5
Sample
vivounionapk_v4.2.4.0_d74cb3a_201808271150_signed_aligned.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral6
Sample
vivounionsdk.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral7
Sample
vivounionsdk.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral8
Sample
vivounionsdk.apk
Resource
android-x64-arm64-20240221-en
Malware Config
Targets
-
-
Target
0585eb4661b3cd5e8cd8558bdafa5551_JaffaCakes118
-
Size
18.2MB
-
MD5
0585eb4661b3cd5e8cd8558bdafa5551
-
SHA1
038de821772f40e07c689e9715ec3eca2b3595b4
-
SHA256
1a5e3d80b1bbe0d7d4dedf1b94e6f1c9a708e1b7b6b94697b8f89539633fd331
-
SHA512
f20dad91a65fd1ec471790aebe585d0da555609ac418014fdf58b5bc5affe6cd8f2299aea65a506b922a1c6523720eaf926ed5356554856dae16b3f1713303ac
-
SSDEEP
393216:Gm2s3Ps7ePOTKpAqCbqyGzrdYk+AuXk3G/JXd9cAvfP/:GhsfsHbqCbqZzeBXiGFdCqfX
Score7/10-
Checks Android system properties for emulator presence.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Checks the presence of a debugger
-
-
-
Target
seckeysdk.apk
-
Size
18KB
-
MD5
22952555cbeadbcbec9809b36850f964
-
SHA1
7fefea81d1b9c46c47d87ce48d0d4279fdf00d32
-
SHA256
b69ad1cfcb7ec506876ffb504bff9d8235600019d003600c53ec4e6643d33c81
-
SHA512
61ad7b328fdd9b96f11186cc4a1b41e69f1398885e177ecc61e2d47bf613e5f0adb886c5f57107305dfb27650b8fa1dc22dfa52d366341889b2f3bc525f55fad
-
SSDEEP
384:6DPvZgk1tGXvmr/Q7gcum8uPt2VXLRzHNZcLDER2NU3Y4MHIqz8j43:6D3WyGXvmro7g/vKYVXLRzf6DGqEOp
Score1/10 -
-
-
Target
vivounionapk_v4.2.4.0_d74cb3a_201808271150_signed_aligned.vua
-
Size
4.2MB
-
MD5
3200674229ed57cf762fc3d8c5137b55
-
SHA1
0896d5f138545dc9ddbf0003518880d745c8fe0e
-
SHA256
333ee74803ab4b114d6217250623869c751a00f4748c826c19ffcd7b29476195
-
SHA512
31c96314a2b0d80ef3d6c04c0a6894b6a8ebff7e501fd48499ea0e12969ba4ac00cdd844caf839a16cdcffa5b51ee2f33af36a578dfd450c79c7e2bbc0c521ff
-
SSDEEP
98304:aQn4W5hESDzkY18DTTcDPPIKGPBhFI+sqFkSOO:aQ4W5hEIkg8DTTcDPPIK+HFknO
Score7/10-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
-
-
Target
vivounionsdk.res
-
Size
29KB
-
MD5
7a92466708fa1ae45c5585a5b986f5aa
-
SHA1
e9e8e0dc60208b7a8b64a65550442a73f1166c30
-
SHA256
cc8416f87003538f2c8ea5280a7eaebfb40597b6ebdcc33c4fa64b0cf08d3b73
-
SHA512
026dec17ed60d89257c8cb7873a0ccc0de910aad6706f1bbb7936229d7074b9542b7b80a2040f466c64e6cf8896e8531ee01ed7acbfa6a7ed90637a5fe2d477d
-
SSDEEP
384:RAhiLwh2JKStCYi7PSSDq41bVjDIcRy3ftLYHiLaBsKFj+C:RAV2wYnSDqojDIcsfiHiG3l
Score1/10 -