General
-
Target
ad5628a05ded0e8c12bbd5a6690012b1_JaffaCakes118
-
Size
4.9MB
-
Sample
240615-jb5bgsscrc
-
MD5
ad5628a05ded0e8c12bbd5a6690012b1
-
SHA1
208fa5f7958b2208fca890684fe51d8a3c575d2c
-
SHA256
eb6bd4f48e5f52379bd252664f003e4b649303b6a6b1a385c4775f42b4e4825c
-
SHA512
5f5b0143d5e46702db206c9291b0da0d415bee461793cd5028e5e20c8923169c895f10868c10c7fb6dd288773da73dc394754ab8a6396813c4d40a7a6b9167e8
-
SSDEEP
98304:lz3dYYyz+vSNq8z2Gp3qftw38z2GeI08mVuGomgowf:lrdYY3kz2w0qgYI08mV2txf
Static task
static1
Behavioral task
behavioral1
Sample
ad5628a05ded0e8c12bbd5a6690012b1_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
Behavioral task
behavioral2
Sample
ad5628a05ded0e8c12bbd5a6690012b1_JaffaCakes118.apk
Resource
android-33-x64-arm64-20240611.1-en
Behavioral task
behavioral3
Sample
com.jiubang.goscreenlock.simpletheme.apk
Resource
android-x86-arm-20240611.1-en
Behavioral task
behavioral4
Sample
com.jiubang.goscreenlock.theme.zero.apk
Resource
android-x86-arm-20240611.1-en
Behavioral task
behavioral5
Sample
com.jiubang.goscreenlock.theme.zero.apk
Resource
android-x64-20240611.1-en
Behavioral task
behavioral6
Sample
com.jiubang.goscreenlock.theme.zero.apk
Resource
android-x64-arm64-20240611.1-en
Malware Config
Targets
-
-
Target
ad5628a05ded0e8c12bbd5a6690012b1_JaffaCakes118
-
Size
4.9MB
-
MD5
ad5628a05ded0e8c12bbd5a6690012b1
-
SHA1
208fa5f7958b2208fca890684fe51d8a3c575d2c
-
SHA256
eb6bd4f48e5f52379bd252664f003e4b649303b6a6b1a385c4775f42b4e4825c
-
SHA512
5f5b0143d5e46702db206c9291b0da0d415bee461793cd5028e5e20c8923169c895f10868c10c7fb6dd288773da73dc394754ab8a6396813c4d40a7a6b9167e8
-
SSDEEP
98304:lz3dYYyz+vSNq8z2Gp3qftw38z2GeI08mVuGomgowf:lrdYY3kz2w0qgYI08mV2txf
Score7/10-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries the phone number (MSISDN for GSM devices)
-
Reads the content of SMS inbox messages.
-
Reads the content of the call log.
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Queries information about active data network
-
Reads information about phone network operator.
-
-
-
Target
com.jiubang.goscreenlock.simpletheme.zip
-
Size
1.1MB
-
MD5
45f4307602f7dc8109e9245107d27b5c
-
SHA1
e07a34524efa3bb97abdadde4258c6e7906f1e07
-
SHA256
68c8747ba85ee7945145dc5e8e89ed50106c6793da5499837b614c51554dbc96
-
SHA512
50174dbdb035e9c82233a879797d1c204ad7cdfe8f9f81592c8fe5be1e3dd2e814884737cc59fdd289e46375c86d1e76a6f303038e561e8f6903c6e1be029236
-
SSDEEP
24576:M2bHzlqRDq72xwx3++laIj1h404V7Tc/k3s:M2bJIzwl6Kic/p
Score1/10 -
-
-
Target
com.jiubang.goscreenlock.theme.zero.zip
-
Size
949KB
-
MD5
5787104f9c64fe205cdc3b357e917bbf
-
SHA1
2afbc09e8babe89e033fd12b962a32e46591e9bc
-
SHA256
e5d9ed8e5389a3e1d6f8deac1a52c2b2e9b57d7ba70cea5f3b562a9e057260f9
-
SHA512
5428d2854be35c86983285acbf920e185eca36fdd6134c84660fdae356b7d0252f55a04e8c32b05446a7cbbe8f547394e1ef7d0792c2e318098399d280c52a45
-
SSDEEP
24576:BvnWzJmdnxYcQJ/d724sbhNo4zqGVk7PKhDe:FcJgxYpdghNoLGVSKhDe
Score1/10 -