General
-
Target
bb0a0cc66601421f641a8c1c91156352_JaffaCakes118
-
Size
13.1MB
-
Sample
240618-gs2wks1ajg
-
MD5
bb0a0cc66601421f641a8c1c91156352
-
SHA1
d3b506de9d03e511c78186718cd986caf99ee0c4
-
SHA256
914946849f3235667dc55b2cd47dc4c09433bf952eeca31d71202099fe855ab4
-
SHA512
e6434bbc07a0c4bf08a1d91399a5312549acfdf3426dbd308e3a31bba3ec49e2f6378f08db11c202328234bba46abea88a7c4ff6081ab060a38cb4d752f52e7d
-
SSDEEP
393216:Gb5LaL0PTf3MwAmw/SAaaXDNsLed/xV5L7By:QpPjMgw1aaXCLcFc
Static task
static1
Behavioral task
behavioral1
Sample
bb0a0cc66601421f641a8c1c91156352_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
Behavioral task
behavioral2
Sample
AlipayMSP206_PPS3_V3.5.4.0619.apk
Resource
android-x86-arm-20240611.1-en
Malware Config
Targets
-
-
Target
bb0a0cc66601421f641a8c1c91156352_JaffaCakes118
-
Size
13.1MB
-
MD5
bb0a0cc66601421f641a8c1c91156352
-
SHA1
d3b506de9d03e511c78186718cd986caf99ee0c4
-
SHA256
914946849f3235667dc55b2cd47dc4c09433bf952eeca31d71202099fe855ab4
-
SHA512
e6434bbc07a0c4bf08a1d91399a5312549acfdf3426dbd308e3a31bba3ec49e2f6378f08db11c202328234bba46abea88a7c4ff6081ab060a38cb4d752f52e7d
-
SSDEEP
393216:Gb5LaL0PTf3MwAmw/SAaaXDNsLed/xV5L7By:QpPjMgw1aaXCLcFc
Score1/10 -
-
-
Target
AlipayMSP206_PPS3_V3.5.4.0619.apk
-
Size
354KB
-
MD5
12ae4560d8350db4bd6fa3bc1589614c
-
SHA1
dbbfce036a1823aaec9d1c7b621adbd7317f7fa9
-
SHA256
46f025d57f9aed1fb674c0fe8fc77add93cf00ea6e1633596955f33426be7688
-
SHA512
df7348142a8c294d0d7f7ce77795fd0f81f60831ca1831164e5060c900aa90af430b11f6972103a5c6307d81d8cdf095105a9ab3d01c2183d10d01910976c6fd
-
SSDEEP
6144:ipIlfloegHi/BBs3dWcfihtB7+Y3Ju4g29f5C8EcPK+WvyQcy2fn1E:ip2JgC/BBsNWfh3Vcc5CLE8Rcy2fn1E
Score7/10-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-