General
-
Target
4a14f3f3434460162dfaf117cc78d53e_JaffaCakes118
-
Size
31.9MB
-
Sample
240516-jqp54sah6w
-
MD5
4a14f3f3434460162dfaf117cc78d53e
-
SHA1
7e40102fbc9e37db6b5561e29d7bab8e705c0754
-
SHA256
22b1a44c215fc78c5b7e4af4351c789fa1dfcb8f3951e4f0cddf532518d94c89
-
SHA512
d1e165b264f070b2be81f41e8438cd1d7f6445fef60f3951a83e0b639ca7c2a14a8a22241f26115bcfd7f35c49c8449fbd82851a85425d34fc134d4bd3b1feef
-
SSDEEP
786432:zNDaedLoyUEY364BdP1DRQ9E+iL2Z+7lALFkmAo80Zc0fta3/u:z5FodV6yd9DR1+iGr80Zc0Fa3/u
Static task
static1
Behavioral task
behavioral1
Sample
4a14f3f3434460162dfaf117cc78d53e_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
com.alipay.android.app.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral3
Sample
com.alipay.android.app.apk
Resource
android-x64-20240514-en
Malware Config
Targets
-
-
Target
4a14f3f3434460162dfaf117cc78d53e_JaffaCakes118
-
Size
31.9MB
-
MD5
4a14f3f3434460162dfaf117cc78d53e
-
SHA1
7e40102fbc9e37db6b5561e29d7bab8e705c0754
-
SHA256
22b1a44c215fc78c5b7e4af4351c789fa1dfcb8f3951e4f0cddf532518d94c89
-
SHA512
d1e165b264f070b2be81f41e8438cd1d7f6445fef60f3951a83e0b639ca7c2a14a8a22241f26115bcfd7f35c49c8449fbd82851a85425d34fc134d4bd3b1feef
-
SSDEEP
786432:zNDaedLoyUEY364BdP1DRQ9E+iL2Z+7lALFkmAo80Zc0fta3/u:z5FodV6yd9DR1+iGr80Zc0Fa3/u
-
Acquires the wake lock
-
-
-
Target
com.alipay.android.app.apk
-
Size
748KB
-
MD5
d06ea38e4210a87d6b96f8b0491df677
-
SHA1
3ba573396398757088e559a9d372049a377eb05a
-
SHA256
76a24f83ad15586ff9a2081e420a707be9ddb0b5047e5b6de5974c41624ff2c1
-
SHA512
3d43e5bfad2b703a804a53048b6a88228a11fb80ac641d6594f774cc07f6c7367e0ee80b29966d02c9206542f467f55b0f1ddbbfef0ec372256314a7d1071f30
-
SSDEEP
12288:IjRAsoln+WMB1EgrGERh4xWgtSM7vXrRCn4I5p2Cnfv:IjRApZ+WM7yER61P7jw4IGSfv
Score1/10 -