General
-
Target
3bc2ec87a2ed27ee88809b7f05a7b68b_JaffaCakes118
-
Size
13.9MB
-
Sample
240512-yejaradb6x
-
MD5
3bc2ec87a2ed27ee88809b7f05a7b68b
-
SHA1
0686ccd0b2a261388694d6ab4e852c6ce72fc9f5
-
SHA256
a642cf240ab20683172ddcc1902be618934191329aa8871579cf96b49c6c3b36
-
SHA512
4419ed1fa20ebfac3c42ba024fcd61265f9e85da9752b6e962e28e8655116eee93d2b940075a4e875c85a1c5b9decbd539ee1a87eff7050416573a5ec365da82
-
SSDEEP
393216:D63UOPFoEoK7G0da+MESxtH6YZiPiUL+87E9q/J:dT27G0o+vAz1gh
Behavioral task
behavioral1
Sample
3bc2ec87a2ed27ee88809b7f05a7b68b_JaffaCakes118.apk
Resource
android-x86-arm-20240506-en
Behavioral task
behavioral2
Sample
Alipay_msp_online.apk
Resource
android-x86-arm-20240506-en
Malware Config
Extracted
joker
http://dg.ogengine.com
Targets
-
-
Target
3bc2ec87a2ed27ee88809b7f05a7b68b_JaffaCakes118
-
Size
13.9MB
-
MD5
3bc2ec87a2ed27ee88809b7f05a7b68b
-
SHA1
0686ccd0b2a261388694d6ab4e852c6ce72fc9f5
-
SHA256
a642cf240ab20683172ddcc1902be618934191329aa8871579cf96b49c6c3b36
-
SHA512
4419ed1fa20ebfac3c42ba024fcd61265f9e85da9752b6e962e28e8655116eee93d2b940075a4e875c85a1c5b9decbd539ee1a87eff7050416573a5ec365da82
-
SSDEEP
393216:D63UOPFoEoK7G0da+MESxtH6YZiPiUL+87E9q/J:dT27G0o+vAz1gh
Score7/10-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
-
-
Target
Alipay_msp_online.apk
-
Size
354KB
-
MD5
89c04e1ebcd58eca6dd93211628ed0bc
-
SHA1
7d1e77ce25a635299704dbd95bd95c697572ea9d
-
SHA256
ee3c608fff51b313f4e0b3e542bedccb4d4db4c8eb44e63bf4be0d468e9ee117
-
SHA512
3dccaeff9906401855f3071c91012926d7e9250674ea0bb89606e4862223a8343fc7b9369afe4e50031d261b45437107c018f565da5615c49721c3bf1bf6ed01
-
SSDEEP
6144:cH8LfOo+BjGVN8TdW4zxgnm1Us3JuOK2vf5C8EcPK+WvyQcQ2fnq7:cHLxBiVN8pWggmlY25CLE8RcQ2fnq7
Score8/10-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Checks if the internet connection is available
-