General
-
Target
9896a6c6761b45c5a99a83f559f6a21c_JaffaCakes118
-
Size
5.1MB
-
Sample
240605-tl1fdscd66
-
MD5
9896a6c6761b45c5a99a83f559f6a21c
-
SHA1
45b962fac6a8acbde29244483e7a0492a0677063
-
SHA256
6be93359cbe3875f2254c8afc4dc31bcb522e163211c11ec6c11019f7576fb1c
-
SHA512
0e6710a16646d568b9e5e7b9f9843aa9d28869889d364f1fd16d8ae55c3f51e0031f66b883e70f8606161426229ca0677a91484233061d1ae4e2cb8dd8c42ad5
-
SSDEEP
98304:3daQZ3JQLBVVVVVVV0zlq07Ui/OtcV94v3bb8oD/gdJOQRm6qgIXRnCP6xS:cQZDM569kbjMd3c6qgIXxCP6M
Static task
static1
Behavioral task
behavioral1
Sample
9896a6c6761b45c5a99a83f559f6a21c_JaffaCakes118.apk
Resource
android-x86-arm-20240603-en
Behavioral task
behavioral2
Sample
alipay_msp.apk
Resource
android-x86-arm-20240603-en
Malware Config
Targets
-
-
Target
9896a6c6761b45c5a99a83f559f6a21c_JaffaCakes118
-
Size
5.1MB
-
MD5
9896a6c6761b45c5a99a83f559f6a21c
-
SHA1
45b962fac6a8acbde29244483e7a0492a0677063
-
SHA256
6be93359cbe3875f2254c8afc4dc31bcb522e163211c11ec6c11019f7576fb1c
-
SHA512
0e6710a16646d568b9e5e7b9f9843aa9d28869889d364f1fd16d8ae55c3f51e0031f66b883e70f8606161426229ca0677a91484233061d1ae4e2cb8dd8c42ad5
-
SSDEEP
98304:3daQZ3JQLBVVVVVVV0zlq07Ui/OtcV94v3bb8oD/gdJOQRm6qgIXRnCP6xS:cQZDM569kbjMd3c6qgIXxCP6M
Score1/10 -
-
-
Target
alipay_msp.apk
-
Size
354KB
-
MD5
89c04e1ebcd58eca6dd93211628ed0bc
-
SHA1
7d1e77ce25a635299704dbd95bd95c697572ea9d
-
SHA256
ee3c608fff51b313f4e0b3e542bedccb4d4db4c8eb44e63bf4be0d468e9ee117
-
SHA512
3dccaeff9906401855f3071c91012926d7e9250674ea0bb89606e4862223a8343fc7b9369afe4e50031d261b45437107c018f565da5615c49721c3bf1bf6ed01
-
SSDEEP
6144:cH8LfOo+BjGVN8TdW4zxgnm1Us3JuOK2vf5C8EcPK+WvyQcQ2fnq7:cHLxBiVN8pWggmlY25CLE8RcQ2fnq7
Score7/10-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-