Overview
overview
8Static
static
66a7537bb73...18.apk
android-9-x86
86a7537bb73...18.apk
android-13-x64
VqsPhone.apk
android-9-x86
1VqsPhone.apk
android-10-x64
1VqsPhone.apk
android-11-x64
1__pasys_re...er.apk
android-9-x86
__pasys_re...er.apk
android-10-x64
__pasys_re...er.apk
android-11-x64
__pasys_re...er.apk
android-9-x86
__pasys_re...er.apk
android-10-x64
__pasys_re...er.apk
android-11-x64
Analysis
-
max time kernel
17s -
max time network
131s -
platform
android_x86 -
resource
android-x86-arm-20240514-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240514-enlocale:en-usos:android-9-x86system -
submitted
23-05-2024 09:15
Static task
static1
Behavioral task
behavioral1
Sample
6a7537bb73569dcfaae7bc63dce1595f_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
6a7537bb73569dcfaae7bc63dce1595f_JaffaCakes118.apk
Resource
android-33-x64-arm64-20240514-en
Behavioral task
behavioral3
Sample
VqsPhone.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral4
Sample
VqsPhone.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral5
Sample
VqsPhone.apk
Resource
android-x64-arm64-20240514-en
Behavioral task
behavioral6
Sample
__pasys_remote_banner.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral7
Sample
__pasys_remote_banner.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral8
Sample
__pasys_remote_banner.apk
Resource
android-x64-arm64-20240514-en
Behavioral task
behavioral9
Sample
__pasys_remote_banner.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral10
Sample
__pasys_remote_banner.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral11
Sample
__pasys_remote_banner.apk
Resource
android-x64-arm64-20240514-en
General
-
Target
6a7537bb73569dcfaae7bc63dce1595f_JaffaCakes118.apk
-
Size
27.0MB
-
MD5
6a7537bb73569dcfaae7bc63dce1595f
-
SHA1
6d61c683371e9a593ecd203c7091a2fe6e4243ca
-
SHA256
8ab82ad1eb3c3dfe4d7d24f67193c4909844b52578c74e62d838d3b8c6c4f425
-
SHA512
3e3a4a882f77eeb49f3d8922aa8cd7bf6f6aff59192d555bc438f46e76cf9ee4ebaeb8b8955d9d284ee630dcadd4f2bdbec621ace15c0184c7a68450a8495856
-
SSDEEP
786432:jfqIkFjx3sUnB4jjvv2vv6/0P/fHswuHRSrDi7T:9gcAgT2a/0XkwaR6+H
Malware Config
Signatures
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Checks CPU information 2 TTPs 1 IoCs
Checks CPU information which indicate if the system is an emulator.
Processes:
com.crescentmoongames.deergodadsdescription ioc process File opened for read /proc/cpuinfo com.crescentmoongames.deergodads -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
Processes:
com.crescentmoongames.deergodadsdescription ioc process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.crescentmoongames.deergodads