General
-
Target
5336892d2e67e465d6e2b0ed86235f7a_JaffaCakes118
-
Size
8.4MB
-
Sample
240518-gbw9rsea61
-
MD5
5336892d2e67e465d6e2b0ed86235f7a
-
SHA1
984d8eaf1558adcaed53b42299c449e4bca59255
-
SHA256
6b33edbb28801867d9eda5874c4b3231fff132b48ff0162616661ea752527d3b
-
SHA512
e9ea95774d073248b2b1df7544ae529b64f622581b3a59a93dcb9234a114f314578a25e0f41d0464f6eb4f8dc0b92516bc352dcda129a94bf486560046860075
-
SSDEEP
196608:GHQqVlCtDr+3y8krHOJy+Uvzjxi5hcitsMan7oz2W0Otufr1a/MdNV:fqKtHeyIIbRViM7pOtkr1sMjV
Static task
static1
Behavioral task
behavioral1
Sample
5336892d2e67e465d6e2b0ed86235f7a_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
vivounionapk_v4.2.0.0_130e63a_201805051638_signed_aligned.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral3
Sample
wifipush_internal.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral4
Sample
wifipush_internal.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral5
Sample
wifipush_internal.apk
Resource
android-x64-arm64-20240514-en
Malware Config
Targets
-
-
Target
5336892d2e67e465d6e2b0ed86235f7a_JaffaCakes118
-
Size
8.4MB
-
MD5
5336892d2e67e465d6e2b0ed86235f7a
-
SHA1
984d8eaf1558adcaed53b42299c449e4bca59255
-
SHA256
6b33edbb28801867d9eda5874c4b3231fff132b48ff0162616661ea752527d3b
-
SHA512
e9ea95774d073248b2b1df7544ae529b64f622581b3a59a93dcb9234a114f314578a25e0f41d0464f6eb4f8dc0b92516bc352dcda129a94bf486560046860075
-
SSDEEP
196608:GHQqVlCtDr+3y8krHOJy+Uvzjxi5hcitsMan7oz2W0Otufr1a/MdNV:fqKtHeyIIbRViM7pOtkr1sMjV
Score8/10-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
-
-
Target
vivounionapk_v4.2.0.0_130e63a_201805051638_signed_aligned.vua
-
Size
4.1MB
-
MD5
e4ddeaae4526ad8044a2e984ff9cabb7
-
SHA1
b0abe8aa7c19fc53f346167c3fd7f0b9d87a12ec
-
SHA256
b3a51e80dfcec0755cab740e62feed408cd22857f3c40c3cfd1a8f388c81cdf8
-
SHA512
7826de6bf2a8cf5574a7a5d4c28c73ebfe085c301fd69ea14c3cef45ed5d5abce2c4b72068da598c0dd70b455bbbac912b010f2e6193985678ab7042f4a61a43
-
SSDEEP
98304:lHQnWhVPImz73W9L04sdYKWIrrbEx6pxoSd:NQ0PImPkTtKI6jF
Score7/10-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
-
-
Target
wifipush_internal.dwt
-
Size
72KB
-
MD5
e53c5544b2d7506de055ed40de57315d
-
SHA1
8c45794fe9fb6f4c3eac98c574cd6d2451dd37eb
-
SHA256
a848fed5925035dc4c2f2fc1e6dd2633e347d6b1adda788c0a5b40bbffd1778b
-
SHA512
15b0f4d6d408c2b52f951b5079a839ae21c93362b8b655a6b07a9be6097f1c1ee51979ac9fafd531a8987c777cf5902321a499281e5b91b4dea701d52dca63f0
-
SSDEEP
1536:Arq8TciGnqIFy/FlVOTv+RcXbirBFLeHqfojb5RE9+I:SqkciGnqIFy/Mb+RYWr/eWQb0sI
Score1/10 -