General
-
Target
aff0332f46496a82e23e06e579cda8f7_JaffaCakes118
-
Size
5.8MB
-
Sample
240615-zgal3axdkn
-
MD5
aff0332f46496a82e23e06e579cda8f7
-
SHA1
be5d76d050b0164eac072245a424f74309f49ff9
-
SHA256
dd3c8b6ccbd3beb17c6d3d4a42ef2003db05153daec9ecd5e7b2db136bf4823c
-
SHA512
4139d0a56f4267b258c3ffce27d3b47766848d5364629848d8e5d54c748086dab6bb048bb97eb3ac22fa444b5a143fd82e3b72c2bd9ae03cbf385e403026acc9
-
SSDEEP
98304:I4IFjh+Ew7FR1tgYMqpYdvPeMdtkMPOtsifcQKl2/r02sWWSaCjkelMD:9IFItyYMqQWokMPOzLKl2/shSaCw+MD
Static task
static1
Behavioral task
behavioral1
Sample
aff0332f46496a82e23e06e579cda8f7_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
Behavioral task
behavioral2
Sample
baidu.apk
Resource
android-x86-arm-20240611.1-en
Behavioral task
behavioral3
Sample
baidu.apk
Resource
android-x64-20240611.1-en
Behavioral task
behavioral4
Sample
baidu.apk
Resource
android-x64-arm64-20240611.1-en
Behavioral task
behavioral5
Sample
gdtad.apk
Resource
android-x86-arm-20240611.1-en
Behavioral task
behavioral6
Sample
gdtad.apk
Resource
android-x64-20240611.1-en
Behavioral task
behavioral7
Sample
gdtad.apk
Resource
android-x64-arm64-20240611.1-en
Malware Config
Targets
-
-
Target
aff0332f46496a82e23e06e579cda8f7_JaffaCakes118
-
Size
5.8MB
-
MD5
aff0332f46496a82e23e06e579cda8f7
-
SHA1
be5d76d050b0164eac072245a424f74309f49ff9
-
SHA256
dd3c8b6ccbd3beb17c6d3d4a42ef2003db05153daec9ecd5e7b2db136bf4823c
-
SHA512
4139d0a56f4267b258c3ffce27d3b47766848d5364629848d8e5d54c748086dab6bb048bb97eb3ac22fa444b5a143fd82e3b72c2bd9ae03cbf385e403026acc9
-
SSDEEP
98304:I4IFjh+Ew7FR1tgYMqpYdvPeMdtkMPOtsifcQKl2/r02sWWSaCjkelMD:9IFItyYMqQWokMPOzLKl2/shSaCw+MD
Score1/10 -
-
-
Target
baidu.apk
-
Size
526KB
-
MD5
3b8a5fd554aeabc5958a7e77599f4d38
-
SHA1
a4aab5f62d41171b6f44360373858cbe996e6ca3
-
SHA256
c7cf0a3f2ea3d24f4a98255ac25242b427bdac34bdf9f88cdfafd9b5aaa995fc
-
SHA512
473e22975fdfba8312393f1c8e1c02bd221671030468cbbdec66e9148c15cd83720340bf886001f1a026f4a449fea48f0798b82c0fdbee42646ae628670b32c4
-
SSDEEP
6144:X09tBgALdefZ3thwJZtqKLUgKLCIt3uNrzDrJVB8wEoKU8/qGD2RZObJd2MA9vac:X0xgAL+98JpSVOrHrd87Uc8qMvfCKD
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries the mobile country code (MCC)
-
-
-
Target
gdtad.jar
-
Size
70KB
-
MD5
38ba61c111904954f2e260bbdd3e4c7e
-
SHA1
4f716d6831efacc24120af780f6024cd8c317514
-
SHA256
6c7f8550d9d8ee69e9a3ac03df6b728128e067add2968a2ac2760285bd08e8f4
-
SHA512
766281488451dfa121d2973a07058cb9213da3d39e2c6b77f84d0daad0937b1c1cb35eaae2f04a700a1d30ca60fd4b62da669fcf2bf70fdb570fc43a65b65dba
-
SSDEEP
1536:Pi0nVmVyW1BgnB5mw+a4ChZ4S7JaWq7puQVfavWD+2Bmb9nJR2Rsr:PRkWnPz/zwZ97J4C+2YSWr
Score1/10 -