General
-
Target
bc09669643719de03fc2396aa75966ea_JaffaCakes118
-
Size
6.1MB
-
Sample
240618-p4q78aycpp
-
MD5
bc09669643719de03fc2396aa75966ea
-
SHA1
b5253b515be233f3b7c9eae33af3f8a3e2404807
-
SHA256
49c3212ed29b61a297f9c27a5c879000504a5b615c33bc32f3ba211c182012a0
-
SHA512
bfa0a297de34968720c09111715d42eb14ca8b0f42ebd7b3eb80edd87209df6b0fb7c04cb0261f3ef1f500ecd03b4f4f98b8b87f77574aad1b80d7533976fcdb
-
SSDEEP
196608:tTdZoF/mJO0SPGDpvOgirWl/WldYlkwwra:dd2wJOLeDBVirsOYetra
Static task
static1
Behavioral task
behavioral1
Sample
bc09669643719de03fc2396aa75966ea_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
Behavioral task
behavioral2
Sample
bc09669643719de03fc2396aa75966ea_JaffaCakes118.apk
Resource
android-x64-20240611.1-en
Behavioral task
behavioral3
Sample
alipay_msp.apk
Resource
android-x86-arm-20240611.1-en
Behavioral task
behavioral4
Sample
com.skymobi.pay.opplugin_V2009.apk
Resource
android-x86-arm-20240611.1-en
Behavioral task
behavioral5
Sample
com.skymobi.pay.opplugin_V2009.apk
Resource
android-x64-20240611.1-en
Behavioral task
behavioral6
Sample
com.skymobi.pay.opplugin_V2009.apk
Resource
android-x64-arm64-20240611.1-en
Malware Config
Targets
-
-
Target
bc09669643719de03fc2396aa75966ea_JaffaCakes118
-
Size
6.1MB
-
MD5
bc09669643719de03fc2396aa75966ea
-
SHA1
b5253b515be233f3b7c9eae33af3f8a3e2404807
-
SHA256
49c3212ed29b61a297f9c27a5c879000504a5b615c33bc32f3ba211c182012a0
-
SHA512
bfa0a297de34968720c09111715d42eb14ca8b0f42ebd7b3eb80edd87209df6b0fb7c04cb0261f3ef1f500ecd03b4f4f98b8b87f77574aad1b80d7533976fcdb
-
SSDEEP
196608:tTdZoF/mJO0SPGDpvOgirWl/WldYlkwwra:dd2wJOLeDBVirsOYetra
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current nearby Wi-Fi networks
Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Reads information about phone network operator.
-
Listens for changes in the sensor environment (might be used to detect emulation)
-
-
-
Target
alipay_msp.apk
-
Size
354KB
-
MD5
89c04e1ebcd58eca6dd93211628ed0bc
-
SHA1
7d1e77ce25a635299704dbd95bd95c697572ea9d
-
SHA256
ee3c608fff51b313f4e0b3e542bedccb4d4db4c8eb44e63bf4be0d468e9ee117
-
SHA512
3dccaeff9906401855f3071c91012926d7e9250674ea0bb89606e4862223a8343fc7b9369afe4e50031d261b45437107c018f565da5615c49721c3bf1bf6ed01
-
SSDEEP
6144:cH8LfOo+BjGVN8TdW4zxgnm1Us3JuOK2vf5C8EcPK+WvyQcQ2fnq7:cHLxBiVN8pWggmlY25CLE8RcQ2fnq7
Score7/10-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
-
-
Target
com.skymobi.pay.opplugin_V2009.apk
-
Size
164KB
-
MD5
a40c1207bf356c7732a1b2a6bb610124
-
SHA1
3195c52690165edb510ad4c22b0eeae5f19de06b
-
SHA256
e2c0a59924b10f0af536580e4ae995827c951b10f5e47ac1a8f23082d891de5b
-
SHA512
5730bb406b25a7a666855db11cf8b36e4be1cf1e8813d787389d898770fc035a7cab94706692ffc36450274e97a04b6ba05929ab624f51914e730873c5cf8618
-
SSDEEP
3072:yvz+O85MQUtKgrLBOqZuhZgUIB3Bpq2rLNTrfJpq7cIhSBo:O+Om6hgqgk7BRpdpTrhM77hWo
Score1/10 -
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Execution Guardrails
1Geofencing
1Hide Artifacts
1User Evasion
1