General
-
Target
a961eee7f5c7ca03483e274dbd939e3a_JaffaCakes118
-
Size
17.3MB
-
Sample
240614-ncjtdsybme
-
MD5
a961eee7f5c7ca03483e274dbd939e3a
-
SHA1
e5eb2e6c056dfba45891b72de71a02ebf44903b8
-
SHA256
71ec0aa7b9191d7612e814581be77122f6997e2b3f079bded8a88be4f97d63fe
-
SHA512
a42e0773910c73861e1faf1a32c4557b358a335fdbeadef9d49225b0abaff5f457bbfa9be206a0d74998361d631335b7be934079f09810dbb0d7c100358bd3d7
-
SSDEEP
393216:POhu36e3/Idv4mAY4T6nRVpv+dicgvWbpbROU:WhAV3/IxWPCvF+Y/WVwU
Static task
static1
Behavioral task
behavioral1
Sample
a961eee7f5c7ca03483e274dbd939e3a_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
Behavioral task
behavioral2
Sample
a961eee7f5c7ca03483e274dbd939e3a_JaffaCakes118.apk
Resource
android-x64-20240611.1-en
Behavioral task
behavioral3
Sample
paanydoor_resource_2.2.0.apk
Resource
android-x86-arm-20240611.1-en
Behavioral task
behavioral4
Sample
paanydoor_resource_2.2.0.apk
Resource
android-x64-20240611.1-en
Behavioral task
behavioral5
Sample
paanydoor_resource_2.2.0.apk
Resource
android-x64-arm64-20240611.1-en
Malware Config
Targets
-
-
Target
a961eee7f5c7ca03483e274dbd939e3a_JaffaCakes118
-
Size
17.3MB
-
MD5
a961eee7f5c7ca03483e274dbd939e3a
-
SHA1
e5eb2e6c056dfba45891b72de71a02ebf44903b8
-
SHA256
71ec0aa7b9191d7612e814581be77122f6997e2b3f079bded8a88be4f97d63fe
-
SHA512
a42e0773910c73861e1faf1a32c4557b358a335fdbeadef9d49225b0abaff5f457bbfa9be206a0d74998361d631335b7be934079f09810dbb0d7c100358bd3d7
-
SSDEEP
393216:POhu36e3/Idv4mAY4T6nRVpv+dicgvWbpbROU:WhAV3/IxWPCvF+Y/WVwU
Score7/10-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries the phone number (MSISDN for GSM devices)
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Listens for changes in the sensor environment (might be used to detect emulation)
-
-
-
Target
paanydoor_resource_2.2.0.png
-
Size
293KB
-
MD5
17c2c10ceb85d7aec5c08e5c90e3ae87
-
SHA1
2ae6fb5ac927d3d6ddb4596032ba5ee391393031
-
SHA256
919a1c5d6b8ab9c585a4e99d0cc624bcce1731cd1b045d86a55a470820ac05bb
-
SHA512
86198db89cb73bb3097ec4c849cb64b078ff14b615147ea5f0fc662ee3a560a84b5c9cbfa6a42731634f2656f3c0e0bb1a24bc47c0bc2302cf7723ffb804bf97
-
SSDEEP
6144:Qk17dzBLcjRDIWWor6pTZBHAB5FLnQrw5nJUILAzPFftbRXYb84GZfv:QCJz+h7WAOVAlLQrQniILAjFfttXYb8T
Score1/10 -