General
-
Target
66d8702bf3b3a06202fc096da81583c9_JaffaCakes118
-
Size
27.9MB
-
Sample
240522-lsyldabb4s
-
MD5
66d8702bf3b3a06202fc096da81583c9
-
SHA1
f5fa87441969741488525d02531ce5c71935037c
-
SHA256
b2e18016f02328af66311fab74dc0aa633e12a5c26456a02ed0da3c01cd6a0d0
-
SHA512
68b8d088e86f6cdacb28083b9a3ec4ff3228736109a235cbe2a44b90de67cbb1361def53b36147550abd6bc4a314e3d9affdac97853457b9fcd3febf96822126
-
SSDEEP
786432:2OMLp8fQyd3ITnob7uAPh/HyjAPF/HyX5:Wqf8TniSsSJ
Static task
static1
Behavioral task
behavioral1
Sample
66d8702bf3b3a06202fc096da81583c9_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
7723box_pjz.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
66d8702bf3b3a06202fc096da81583c9_JaffaCakes118
-
Size
27.9MB
-
MD5
66d8702bf3b3a06202fc096da81583c9
-
SHA1
f5fa87441969741488525d02531ce5c71935037c
-
SHA256
b2e18016f02328af66311fab74dc0aa633e12a5c26456a02ed0da3c01cd6a0d0
-
SHA512
68b8d088e86f6cdacb28083b9a3ec4ff3228736109a235cbe2a44b90de67cbb1361def53b36147550abd6bc4a314e3d9affdac97853457b9fcd3febf96822126
-
SSDEEP
786432:2OMLp8fQyd3ITnob7uAPh/HyjAPF/HyX5:Wqf8TniSsSJ
Score1/10 -
-
-
Target
7723box_pjz.apk
-
Size
3.3MB
-
MD5
2dbfa511a770cb9923d85b15a9841848
-
SHA1
7618c9af34437781884bec561d12ed2a0781e56a
-
SHA256
07d5827ef21744d399bf1888c198a3715235c887c0abc82cba3545b9864c3837
-
SHA512
fa718fde2af8f491407c927550410eb5eb6a40dc4df144507bd63b285ab7e8b630db85d11da5572b5ecb5b88ed38cc1cdc0d2fa7007717c17ac67ac859ac24be
-
SSDEEP
98304:V3XuuHwWUJrVwUOLuAXaK2Koz8sdw428SlZLx9pvY:hx0rVwUqqK5Iw42vTLx9VY
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Reads information about phone network operator.
-