Overview
overview
7Static
static
663a4693183...18.apk
android-9-x86
763a4693183...18.apk
android-10-x64
763a4693183...18.apk
android-11-x64
7alipay_plu...09.apk
android-9-x86
1alipay_plu...09.apk
android-10-x64
1alipay_plu...09.apk
android-11-x64
1alipay_plu...sp.apk
android-9-x86
1alipay_plu...sp.apk
android-10-x64
1alipay_plu...sp.apk
android-11-x64
1Analysis
-
max time kernel
131s -
max time network
177s -
platform
android_x86 -
resource
android-x86-arm-20240514-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240514-enlocale:en-usos:android-9-x86system -
submitted
21-05-2024 14:36
Static task
static1
Behavioral task
behavioral1
Sample
63a4693183833b1a254a16f6222cbe43_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
63a4693183833b1a254a16f6222cbe43_JaffaCakes118.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral3
Sample
63a4693183833b1a254a16f6222cbe43_JaffaCakes118.apk
Resource
android-x64-arm64-20240514-en
Behavioral task
behavioral4
Sample
alipay_plugin223_0309.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral5
Sample
alipay_plugin223_0309.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral6
Sample
alipay_plugin223_0309.apk
Resource
android-x64-arm64-20240514-en
Behavioral task
behavioral7
Sample
alipay_plugin_20120428msp.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral8
Sample
alipay_plugin_20120428msp.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral9
Sample
alipay_plugin_20120428msp.apk
Resource
android-x64-arm64-20240514-en
General
-
Target
63a4693183833b1a254a16f6222cbe43_JaffaCakes118.apk
-
Size
31.1MB
-
MD5
63a4693183833b1a254a16f6222cbe43
-
SHA1
ed8301894954b7a05bd8c9fecb28e318281aa49e
-
SHA256
4301bdff0b0a6a9b92800f53c43c2ecf727b5c63068beadb6fe218655a05524a
-
SHA512
01c2caea8ae504d697bae1a150807d9209b351630531dda40b95775b5f9cd2f6c6600702ed200a30309820c14bc30691d12d6407f33bc435930764256f7dd0a1
-
SSDEEP
786432:i4FyeO5+FzDT3qkY6lwBak/cdhBFYLsbEllTaLQUv4CBu:cr5ynaKqEkUdCYIllTXUv4v
Malware Config
Signatures
-
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
Processes:
com.mango.sanguo15.sjws01description ioc process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.mango.sanguo15.sjws01 -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
com.mango.sanguo15.sjws01description ioc process Framework service call android.app.IActivityManager.registerReceiver com.mango.sanguo15.sjws01