General
-
Target
553fa329f54648f9aa6ea745f09b8097_JaffaCakes118
-
Size
5.6MB
-
Sample
240518-r3dlvagd31
-
MD5
553fa329f54648f9aa6ea745f09b8097
-
SHA1
51d780d78eaa85d570e7deecaeb798677a289228
-
SHA256
c0e55794f6c4ac7022d313b3a55293483f67f074bde7c89ca8701ce3e58268f4
-
SHA512
41faf4982f78e4380a2fb9b7391705263fed1d2a3fb77160892b2ceb2b74d635411a4b4bdd9c533aac08f3a561b3f3593d62bd053a2108e403a57d668f106d47
-
SSDEEP
98304:rW4QkcjIoqh84inMNGn7I+6sselQP4lJO+9B7V6ofRKEJdH:rW/cxEMuV7Q5GBZj5d9
Static task
static1
Behavioral task
behavioral1
Sample
553fa329f54648f9aa6ea745f09b8097_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
alipay_plugin_20120428msp.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
553fa329f54648f9aa6ea745f09b8097_JaffaCakes118
-
Size
5.6MB
-
MD5
553fa329f54648f9aa6ea745f09b8097
-
SHA1
51d780d78eaa85d570e7deecaeb798677a289228
-
SHA256
c0e55794f6c4ac7022d313b3a55293483f67f074bde7c89ca8701ce3e58268f4
-
SHA512
41faf4982f78e4380a2fb9b7391705263fed1d2a3fb77160892b2ceb2b74d635411a4b4bdd9c533aac08f3a561b3f3593d62bd053a2108e403a57d668f106d47
-
SSDEEP
98304:rW4QkcjIoqh84inMNGn7I+6sselQP4lJO+9B7V6ofRKEJdH:rW/cxEMuV7Q5GBZj5d9
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries the phone number (MSISDN for GSM devices)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
-
-
Target
alipay_plugin_20120428msp.apk
-
Size
332KB
-
MD5
17c548f15a7c90375b94bc3a56025a1a
-
SHA1
46b2d0dbde500c2417b6438e8ecb2dc32dffd37b
-
SHA256
14c5526a13cefa6d82095df76cd4f0445962911b607cbdb72a9c3ad0117b6868
-
SHA512
5ae294dd9426d421426ab7cebbed04b5ad327dcb801044528ae8eaded04a70fe2372b26dbf63aa8c5d687b09cede52207e1d608f115beeac10b9f11e0793dfc8
-
SSDEEP
6144:cBMjVfYqEF229WaIDNFM9wzfkRdGSrfPVX12GHBNd02vpbQTN1xUS52fnzmgvV:csVfOF229WjjfkbGUHdT10I6N1eS52f1
Score1/10 -