General
-
Target
61038b0227b6c5f2d8b5aed63a6a182f_JaffaCakes118
-
Size
3.3MB
-
Sample
240520-y5sbcafg37
-
MD5
61038b0227b6c5f2d8b5aed63a6a182f
-
SHA1
78b0c2dd6b760a0c8f568a309aed5d0052a5ead9
-
SHA256
0502e6d253c011a72db976be50c9aac5071f85de5aa09168ca24d8afca31c109
-
SHA512
715f845ea5195e8119a0f489d69fc90b01ba112b238ec37de13348e5dffc1aca0cbe199699e603782e3b367a90938f33d180f46f97ff5e1ba433e632d94884ef
-
SSDEEP
49152:+MnHl1AGsrdZZXXZJnRErhe8TCiHmSFg7pWWslafRpGZnj6vrRMBOJLFXuPaG:+Mn/AtdrJLENe6FHmzsWHfRsZnj6v6PB
Static task
static1
Behavioral task
behavioral1
Sample
61038b0227b6c5f2d8b5aed63a6a182f_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
gdtadv2.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral3
Sample
gdtadv2.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral4
Sample
gdtadv2.apk
Resource
android-x64-arm64-20240514-en
Malware Config
Targets
-
-
Target
61038b0227b6c5f2d8b5aed63a6a182f_JaffaCakes118
-
Size
3.3MB
-
MD5
61038b0227b6c5f2d8b5aed63a6a182f
-
SHA1
78b0c2dd6b760a0c8f568a309aed5d0052a5ead9
-
SHA256
0502e6d253c011a72db976be50c9aac5071f85de5aa09168ca24d8afca31c109
-
SHA512
715f845ea5195e8119a0f489d69fc90b01ba112b238ec37de13348e5dffc1aca0cbe199699e603782e3b367a90938f33d180f46f97ff5e1ba433e632d94884ef
-
SSDEEP
49152:+MnHl1AGsrdZZXXZJnRErhe8TCiHmSFg7pWWslafRpGZnj6vrRMBOJLFXuPaG:+Mn/AtdrJLENe6FHmzsWHfRsZnj6v6PB
Score1/10 -
-
-
Target
gdtadv2.jar
-
Size
241KB
-
MD5
b95166c2f63e536b6fc4b5b811444dec
-
SHA1
45fc74323bb2e66f4c2a493b65b70e0de2aeb77c
-
SHA256
2f92b98f55c7d4417dff3fc2af9245c66aad3ab8be65177954ed7a4f13bae20d
-
SHA512
65eb813d39270d83e6d43956ec139f04779dbea58e517da1727a0f4fad9de32bb4cd49bed1dc1fec31b95a95b1c653c22b327aa38cba1645330c9d256d94c087
-
SSDEEP
6144:KRKhU/uUwjTCpnUjgWkiCBliWLvghUhSj4qj80Gq7JqBGK:KoUmUgenUjwBl1jgVjJ57IBl
Score1/10 -