General
-
Target
a844db6c33af9995ae278e6faef2291b_JaffaCakes118
-
Size
10.7MB
-
Sample
240614-gw92cs1hlj
-
MD5
a844db6c33af9995ae278e6faef2291b
-
SHA1
da77cd180d8d45b3c3a3d208a559dc7da57fbe1e
-
SHA256
503961a0cb2cf1784cdd28b558b059bcf5e74b6d0b125c7c9255405139f21242
-
SHA512
8d138e585f2ea5ee6ad03b3f84695053bec4c5cc4bc712181e08482c297ea1dcb6c45576eefb6dc40b94f877a4f164d6b7322e60e1ff5ded89694ac9af5abe40
-
SSDEEP
196608:GURJzbQcFjuOl6/tkv/pB/EZ4dsg/DoG6LLsdqUD0i6cB2QT21qOOfkFwTMNki:BRBbQYjuOl6/tCBcJw/ebK1BwHs1i
Static task
static1
Behavioral task
behavioral1
Sample
a844db6c33af9995ae278e6faef2291b_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
Behavioral task
behavioral2
Sample
alipay_msp.apk
Resource
android-x86-arm-20240611.1-en
Malware Config
Targets
-
-
Target
a844db6c33af9995ae278e6faef2291b_JaffaCakes118
-
Size
10.7MB
-
MD5
a844db6c33af9995ae278e6faef2291b
-
SHA1
da77cd180d8d45b3c3a3d208a559dc7da57fbe1e
-
SHA256
503961a0cb2cf1784cdd28b558b059bcf5e74b6d0b125c7c9255405139f21242
-
SHA512
8d138e585f2ea5ee6ad03b3f84695053bec4c5cc4bc712181e08482c297ea1dcb6c45576eefb6dc40b94f877a4f164d6b7322e60e1ff5ded89694ac9af5abe40
-
SSDEEP
196608:GURJzbQcFjuOl6/tkv/pB/EZ4dsg/DoG6LLsdqUD0i6cB2QT21qOOfkFwTMNki:BRBbQYjuOl6/tCBcJw/ebK1BwHs1i
Score4/10 -
-
-
Target
alipay_msp.apk
-
Size
354KB
-
MD5
89c04e1ebcd58eca6dd93211628ed0bc
-
SHA1
7d1e77ce25a635299704dbd95bd95c697572ea9d
-
SHA256
ee3c608fff51b313f4e0b3e542bedccb4d4db4c8eb44e63bf4be0d468e9ee117
-
SHA512
3dccaeff9906401855f3071c91012926d7e9250674ea0bb89606e4862223a8343fc7b9369afe4e50031d261b45437107c018f565da5615c49721c3bf1bf6ed01
-
SSDEEP
6144:cH8LfOo+BjGVN8TdW4zxgnm1Us3JuOK2vf5C8EcPK+WvyQcQ2fnq7:cHLxBiVN8pWggmlY25CLE8RcQ2fnq7
Score7/10-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-