Overview
overview
8Static
static
698d91d4e76...18.apk
android-9-x86
898d91d4e76...18.apk
android-10-x64
6aisdk_qtt.apk
android-9-x86
aisdk_qtt.apk
android-10-x64
aisdk_qtt.apk
android-11-x64
bdxadsdk.apk
android-9-x86
bdxadsdk.apk
android-10-x64
bdxadsdk.apk
android-11-x64
gdtadv2.apk
android-9-x86
gdtadv2.apk
android-10-x64
gdtadv2.apk
android-11-x64
General
-
Target
98d91d4e761d8bbc987a924b5d4b728e_JaffaCakes118
-
Size
14.6MB
-
Sample
240605-wjmgvsde41
-
MD5
98d91d4e761d8bbc987a924b5d4b728e
-
SHA1
b65459dc9caa57ec173a59708110f7db4d469fa9
-
SHA256
e542f150c7eaf25c2adfb9ae27a7f76056cba91f0ba5886d0c2ba5f24cd7768a
-
SHA512
d0bdfab887a236202b3e0c99ca71a49be3cd385095b6e5c1a14d9434c866c4722eb91fd82a6e44c5e99a254b4b658e3e4f374da568ed112e328411cba5f91748
-
SSDEEP
393216:LoRir8Ef0x07KvKZPSS7m61p96/kTwT+ibjn+Rupo3AY:kR88H0ey3bYGwTD3n+Ua33
Static task
static1
Behavioral task
behavioral1
Sample
98d91d4e761d8bbc987a924b5d4b728e_JaffaCakes118.apk
Resource
android-x86-arm-20240603-en
Behavioral task
behavioral2
Sample
98d91d4e761d8bbc987a924b5d4b728e_JaffaCakes118.apk
Resource
android-x64-20240603-en
Behavioral task
behavioral3
Sample
aisdk_qtt.apk
Resource
android-x86-arm-20240603-en
Behavioral task
behavioral4
Sample
aisdk_qtt.apk
Resource
android-x64-20240603-en
Behavioral task
behavioral5
Sample
aisdk_qtt.apk
Resource
android-x64-arm64-20240603-en
Behavioral task
behavioral6
Sample
bdxadsdk.apk
Resource
android-x86-arm-20240603-en
Behavioral task
behavioral7
Sample
bdxadsdk.apk
Resource
android-x64-20240603-en
Behavioral task
behavioral8
Sample
bdxadsdk.apk
Resource
android-x64-arm64-20240603-en
Behavioral task
behavioral9
Sample
gdtadv2.apk
Resource
android-x86-arm-20240603-en
Behavioral task
behavioral10
Sample
gdtadv2.apk
Resource
android-x64-20240603-en
Behavioral task
behavioral11
Sample
gdtadv2.apk
Resource
android-x64-arm64-20240603-en
Malware Config
Targets
-
-
Target
98d91d4e761d8bbc987a924b5d4b728e_JaffaCakes118
-
Size
14.6MB
-
MD5
98d91d4e761d8bbc987a924b5d4b728e
-
SHA1
b65459dc9caa57ec173a59708110f7db4d469fa9
-
SHA256
e542f150c7eaf25c2adfb9ae27a7f76056cba91f0ba5886d0c2ba5f24cd7768a
-
SHA512
d0bdfab887a236202b3e0c99ca71a49be3cd385095b6e5c1a14d9434c866c4722eb91fd82a6e44c5e99a254b4b658e3e4f374da568ed112e328411cba5f91748
-
SSDEEP
393216:LoRir8Ef0x07KvKZPSS7m61p96/kTwT+ibjn+Rupo3AY:kR88H0ey3bYGwTD3n+Ua33
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-
-
-
Target
aisdk_qtt.jar
-
Size
87KB
-
MD5
9897bba0414afdbc86926201931f3c7d
-
SHA1
06e1c2132c233cbe815cc273b0c66bf9a540a2be
-
SHA256
043eb5ad663b848191f5bf995f3b9fb345ae9aa6fe8054285fe3d554ba1c3481
-
SHA512
bb566c1a31b1c24b8b039bd48a632addd57250da4c6af5917eff8f792e1b4df22b96331b6d0bf327a879f9fea5c515c8d6c18f550389f3369b0e033563092275
-
SSDEEP
1536:BwDxNcrJyNtIyhU/NtapF/lCwtaExMA/UTR0rFqFY4+ZdBHXfd/MYSXtH5VC7p/:7DltSztaZA/TQFYvXHxMYSW/
Score1/10 -
-
-
Target
bdxadsdk.jar
-
Size
193KB
-
MD5
1526ec33e4c8df4103971b9d652f91cb
-
SHA1
dc86db07fd3f5884880fab40da1042e11eac6bc2
-
SHA256
e29aeaf797cdb6ae53975a234a2053822db364868205eddd4ff86dddd3fe4e2c
-
SHA512
524f2a1d16b2b8112ac4282891add556a0d80166cfbe813d9782f3455b431785622344117e20131f5f73787c6e3862701e4173b4f67ad56ed360589135af781c
-
SSDEEP
6144:0f+ySvP+fvJJrLk/T2BC8zFjRmr067fcymDAD91pBbkllZe:DvP+fDrLkyBComrPzczC9Dyjc
Score1/10 -
-
-
Target
gdtadv2.jar
-
Size
241KB
-
MD5
19d7bf7285443f001adbac6ccb106b50
-
SHA1
3627cbed497866718cf332381327834490a37339
-
SHA256
06dd9cef1fd3eb208c9f900458a8028c3468f91c8df74e02c71bd31e8a1f4a02
-
SHA512
a6c470d607fa0ef2ea3e8ca0509a0b2e1c10cb949ff0bfc52d31f61087fcda5e66fdb1caecf3e1176476cdadf96c1bc3a83a59a0b06f3628957fbda28845509f
-
SSDEEP
6144:Ey0Z5aFYVVDtYg7ZnBafqlOmavy7lGGl6+y:Ey0Z5EMm3fN5vdU6+y
Score1/10 -
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Virtualization/Sandbox Evasion
1System Checks
1