General
-
Target
954929bb01220b056e1de0063b6ca686_JaffaCakes118
-
Size
15.1MB
-
Sample
240604-seg5ssba3z
-
MD5
954929bb01220b056e1de0063b6ca686
-
SHA1
1abb1f9b1e5c291d1eb3b6ca99f19458f9e33e5e
-
SHA256
4d3b61726b9709c4b419e54bdd76266748c3419fc00937c212ed63b7904b5d04
-
SHA512
66b6568f30c26969bc56bde6fc8a3cce39b237244dbd12f552e2785dbbe651c58725c8452b481fc3d2afc79c2a825e96627a948250ca57cb16c30378accc584b
-
SSDEEP
393216:FAItX5OixLM1IuQdqSjpBNlcRghuFyfTByUy8hNCibg:FAK5DRp/a6uMBPy8hhk
Static task
static1
Behavioral task
behavioral1
Sample
954929bb01220b056e1de0063b6ca686_JaffaCakes118.apk
Resource
android-x86-arm-20240603-en
Behavioral task
behavioral2
Sample
gamebox.apk
Resource
android-x86-arm-20240603-en
Behavioral task
behavioral3
Sample
gamebox.apk
Resource
android-x64-20240603-en
Behavioral task
behavioral4
Sample
gamebox.apk
Resource
android-x64-arm64-20240603-en
Malware Config
Targets
-
-
Target
954929bb01220b056e1de0063b6ca686_JaffaCakes118
-
Size
15.1MB
-
MD5
954929bb01220b056e1de0063b6ca686
-
SHA1
1abb1f9b1e5c291d1eb3b6ca99f19458f9e33e5e
-
SHA256
4d3b61726b9709c4b419e54bdd76266748c3419fc00937c212ed63b7904b5d04
-
SHA512
66b6568f30c26969bc56bde6fc8a3cce39b237244dbd12f552e2785dbbe651c58725c8452b481fc3d2afc79c2a825e96627a948250ca57cb16c30378accc584b
-
SSDEEP
393216:FAItX5OixLM1IuQdqSjpBNlcRghuFyfTByUy8hNCibg:FAK5DRp/a6uMBPy8hhk
Score7/10-
Checks Android system properties for emulator presence.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about active data network
-
-
-
Target
gamebox.apk
-
Size
1.7MB
-
MD5
fc76d2f2593de86bfb1e3f030b37e6fa
-
SHA1
e27026a53a51a0823c8d4eb6b70b4d6377f530f5
-
SHA256
913d4d664cd5872f03470505f751ed1e303531d1c667497d297923acc01409fd
-
SHA512
b8a510ac6d45998e21be3d817df091123e21d73695b2059f1510491e6be818e299a80aa9b53d914f7d1160e9e920211acdfc79054360e989d366270b050a7df0
-
SSDEEP
49152:N2AtOK4P7HSB1IhZNQwfyeq552L6YBoru:N2iOK48+hZNu5EmYMu
Score1/10 -