General
-
Target
0a9c0f4830002635d461e5e0503492b9_JaffaCakes118
-
Size
7.6MB
-
Sample
240430-213hasbg67
-
MD5
0a9c0f4830002635d461e5e0503492b9
-
SHA1
56b7eaac25098a832eebf014499654cff7b7d0ec
-
SHA256
c6b068b14b42bd4685081edcccc063021d3045aa73637d4542febffdb5e3a103
-
SHA512
7efdf5a434ff112c84eaf8d464cfd0f95e504a68635e10b3048b21af069733501fdf245e3ad26424ce603d95497f2ad84d6945ead7dd1aee03323461afa9d2f4
-
SSDEEP
196608:7HTL+AycWArczCbnVuUZMvCQpLEXTTajf48USvTuvHa2SXUk6v:TeAy5ArczIbZELEGjfTlTH2SXj6v
Static task
static1
Behavioral task
behavioral1
Sample
0a9c0f4830002635d461e5e0503492b9_JaffaCakes118.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
ad_adview.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral3
Sample
ad_adview.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral4
Sample
ad_adview.apk
Resource
android-x64-arm64-20240221-en
Behavioral task
behavioral5
Sample
adbase.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral6
Sample
adbase.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral7
Sample
adbase.apk
Resource
android-x64-arm64-20240221-en
Behavioral task
behavioral8
Sample
gdtadv2.apk
Resource
android-x86-arm-20240221-en
Malware Config
Targets
-
-
Target
0a9c0f4830002635d461e5e0503492b9_JaffaCakes118
-
Size
7.6MB
-
MD5
0a9c0f4830002635d461e5e0503492b9
-
SHA1
56b7eaac25098a832eebf014499654cff7b7d0ec
-
SHA256
c6b068b14b42bd4685081edcccc063021d3045aa73637d4542febffdb5e3a103
-
SHA512
7efdf5a434ff112c84eaf8d464cfd0f95e504a68635e10b3048b21af069733501fdf245e3ad26424ce603d95497f2ad84d6945ead7dd1aee03323461afa9d2f4
-
SSDEEP
196608:7HTL+AycWArczCbnVuUZMvCQpLEXTTajf48USvTuvHa2SXUk6v:TeAy5ArczIbZELEGjfTlTH2SXj6v
Score7/10-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Reads information about phone network operator.
-
-
-
Target
ad_adview.jar
-
Size
221KB
-
MD5
ca8fb09bc237fe1355046786e66af7b6
-
SHA1
b89da3367d6ca1c7e1f1aef22f7373fee72c66d4
-
SHA256
dd3ee54c8158833c9639456d8286bcfc635be25c76ea739463fa07ddb237a46e
-
SHA512
a595e96fe5d1426763af4e86852b0c7b4d710004317a8569b8d14f9c6b3c91a5e4ab94c89e363454714f3915036c7dfb4a5832201c1cf98990836ab12d005617
-
SSDEEP
3072:3fiBEcKjLMbLldukEaAQ3B8yjxHABsAwyLVOsrY9xVcOzPR6EwZyRMhrHej9X/UT:PIsL6lvbAkRl3AwiMxVcOz55/09qjgV
Score1/10 -
-
-
Target
adbase.jar
-
Size
112KB
-
MD5
120fa34bbcbabdf144c2ccab45db5017
-
SHA1
6f79a0de7e1398440cfcc37e10bb0088b7e8b5e2
-
SHA256
65b910040ac1f627cd11b21507ae74daf449da456f3847ad80af29958c42be82
-
SHA512
9e979a5d8609283ff6bc108c0e3c9ae033ede02b069b8147f759ae31d097f426f2c949d386a212c8669ba448081b6fe9ad79f1367fe407e206d6c4f5647875e4
-
SSDEEP
1536:glFeC3ACHlSHDFbbjRirBYNdsi6pUOFxyI0EW0OaHGcuQOBkNrp5mR0sheg3:Gj3ACHIFEdoSi6pVDyB0RmcuQOBkxJzC
Score1/10 -
-
-
Target
gdtadv2.jar
-
Size
385KB
-
MD5
824cb780ec81bb7366121b103e9820c0
-
SHA1
149a0a58257fc4d67722c0a218d4a9119cd9304f
-
SHA256
6d37ca4a40fcbcde1d8aaa1bba643e349614b8600166c50b03e397083725ce90
-
SHA512
658b65bd1b7c044ce4d497378dbdde5915b9e1e57d4911d00df4d694326c15410be7bae556c6ebd335e8f68b619a333856b20213f624874cd0ea1eef0c26672b
-
SSDEEP
6144:oHieHgKECmWW/O4TsEcyFTGl812C9xSzmkoEPn5iXQ9leg6Ob8ggUdJTtUsqpz:kiXbCBW5T7trBxPWA1Ob8sdJTUz
Score1/10 -