General
-
Target
644cc7902d55c825bea755edc53e4da0_JaffaCakes118
-
Size
18.2MB
-
Sample
240521-w2v7qaea79
-
MD5
644cc7902d55c825bea755edc53e4da0
-
SHA1
135ad43f5f32a8e81da19ddd5093896c21f2fbab
-
SHA256
98c57bb1cd6ef93ee8742a8de9e49bf60a0a7fdc8efbadd5b719e0929a635953
-
SHA512
1d96a143a9e47d77cce0db2d039e56207bceaa43d838bfb4bcc1796df27b9b120a470c0358a187af66e76f2801993f29466ee493b3bb67c7431c40d95020c5ab
-
SSDEEP
196608:1rSQ/54R8hNGUY/xuBJ2cRdU+ZrvOu/oYPJ5xE0egfHDyXqQ0QeLoseund07rZTs:xSPR8V7RjJw+fUfe0JTGK7sc3xbmqqTT
Static task
static1
Behavioral task
behavioral1
Sample
644cc7902d55c825bea755edc53e4da0_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
unicom_resource.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral3
Sample
unicom_resource.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral4
Sample
unicom_resource.apk
Resource
android-x64-arm64-20240514-en
Malware Config
Targets
-
-
Target
644cc7902d55c825bea755edc53e4da0_JaffaCakes118
-
Size
18.2MB
-
MD5
644cc7902d55c825bea755edc53e4da0
-
SHA1
135ad43f5f32a8e81da19ddd5093896c21f2fbab
-
SHA256
98c57bb1cd6ef93ee8742a8de9e49bf60a0a7fdc8efbadd5b719e0929a635953
-
SHA512
1d96a143a9e47d77cce0db2d039e56207bceaa43d838bfb4bcc1796df27b9b120a470c0358a187af66e76f2801993f29466ee493b3bb67c7431c40d95020c5ab
-
SSDEEP
196608:1rSQ/54R8hNGUY/xuBJ2cRdU+ZrvOu/oYPJ5xE0egfHDyXqQ0QeLoseund07rZTs:xSPR8V7RjJw+fUfe0JTGK7sc3xbmqqTT
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
-
-
Target
unicom_resource.dat
-
Size
41KB
-
MD5
1099cc55782e9dfbea4df0cc9c42e8af
-
SHA1
c398368af914bbc35187b15201ab9b10de3f0592
-
SHA256
7ae180774a4f784d4ebc21650295cea6269d0c4a1884a5af815930ee47553279
-
SHA512
e6dcdac4c51042db8a91f25cf9d1461c0b4284a5138086fb3264e7090840aa6ca144f18e7bc498d0ecd1d131804193d94bdf471e8ada15f7b30b2bb8359adef8
-
SSDEEP
768:R8gYCYCpONOKIfwiFWAkEsDVop56mAOvuGMC21q0dkHj:9PRpO4KsOOvuG3+dkD
Score1/10 -