General
-
Target
920c431cb88d457865ff1eabe21292f7_JaffaCakes118
-
Size
11.0MB
-
Sample
240603-rbx66sgh3y
-
MD5
920c431cb88d457865ff1eabe21292f7
-
SHA1
ebaf6b81985a3538375adaa822f24b1ad3b9cb4f
-
SHA256
bc3672c8a37e1c51a00b6c21b201d23755ad48f17297fa274d6284ff7bbf5bd0
-
SHA512
bd07fb3e4c5ed16705a189cd1c02d0d3715d55f9e16e081b1f7e4cbbd9d851403fdcf9309b8bd661683116bc44521e9dcbcce796bf2dbbba34945d0c0d5e5051
-
SSDEEP
196608:x5u3rHDzqgXHTxax6jZxa7lNVc9j6VTReW6Ck0s7VXKqaBoN8etRW5WRoFv5:x473qWz0x6jZxaxNw2VTReWmZxKqAoN8
Static task
static1
Behavioral task
behavioral1
Sample
920c431cb88d457865ff1eabe21292f7_JaffaCakes118.apk
Resource
android-x86-arm-20240603-en
Behavioral task
behavioral2
Sample
920c431cb88d457865ff1eabe21292f7_JaffaCakes118.apk
Resource
android-x64-20240603-en
Behavioral task
behavioral3
Sample
bdxadsdk.apk
Resource
android-x86-arm-20240603-en
Behavioral task
behavioral4
Sample
bdxadsdk.apk
Resource
android-x64-20240603-en
Behavioral task
behavioral5
Sample
bdxadsdk.apk
Resource
android-x64-arm64-20240603-en
Behavioral task
behavioral6
Sample
gdtadv2.apk
Resource
android-x86-arm-20240603-en
Malware Config
Targets
-
-
Target
920c431cb88d457865ff1eabe21292f7_JaffaCakes118
-
Size
11.0MB
-
MD5
920c431cb88d457865ff1eabe21292f7
-
SHA1
ebaf6b81985a3538375adaa822f24b1ad3b9cb4f
-
SHA256
bc3672c8a37e1c51a00b6c21b201d23755ad48f17297fa274d6284ff7bbf5bd0
-
SHA512
bd07fb3e4c5ed16705a189cd1c02d0d3715d55f9e16e081b1f7e4cbbd9d851403fdcf9309b8bd661683116bc44521e9dcbcce796bf2dbbba34945d0c0d5e5051
-
SSDEEP
196608:x5u3rHDzqgXHTxax6jZxa7lNVc9j6VTReW6Ck0s7VXKqaBoN8etRW5WRoFv5:x473qWz0x6jZxaxNw2VTReWmZxKqAoN8
-
Checks if the Android device is rooted.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the mobile country code (MCC)
-
Queries the phone number (MSISDN for GSM devices)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-
Listens for changes in the sensor environment (might be used to detect emulation)
-
-
-
Target
bdxadsdk.jar
-
Size
454KB
-
MD5
7ea83ae891bd42c7711a8131f3c503c4
-
SHA1
2d514aa0ef432ae6e5c4147ba9a2465da7b1e8a3
-
SHA256
cbaecab41760f4a7e7e7a3e815c774067476e6c17126f00d2e47046146079d56
-
SHA512
a44fe167926f4b05724381a87d3d3c7b2c2b5c441a62611dca58ebf3ec9d8e71680f392021036cdd54c56c2b60a461b921f5471cc6a997951019aebfc81b627b
-
SSDEEP
6144:9iCYTNvMUa2k7VGVCKLZ+tZBb2ONPFmpGjQkzLC3Xnks1Yn0K4UzAUxxNCbeUxhq:e8vKLZ+tROt7kdt8U3NCbBh1LaA2
Score1/10 -
-
-
Target
gdtadv2.jar
-
Size
636KB
-
MD5
cf57d4f9f2ccd86816c4f02989252423
-
SHA1
6978f24478ba9baa004bf4d21db251fe67957ec2
-
SHA256
e6df28c535e661d33a134407674c32555fb985a6a8f3bf8ec743150db61fa7ec
-
SHA512
f759aea4c4fb91ce69f8238bd0e7c0f99b826cad04fc9c5f47c5afde2eceaf71d515d00f0e08b73c169e1a8bd21a17ddd3971bae27ddeb6960daaf5c5d719d4b
-
SSDEEP
12288:lsocNwAPog24tsNbfevYHzN953QZlo5M0f+DMpP7x07S232vjUG:MNvPA9oYHzN953QEM0npDx0nm
Score1/10 -