General
-
Target
81c435459e8b8d24e144d33e924eac92_JaffaCakes118
-
Size
9.8MB
-
Sample
240801-zwpdrswerr
-
MD5
81c435459e8b8d24e144d33e924eac92
-
SHA1
94533622319010b58871fcdde27f0b48f05c5b58
-
SHA256
4e8a56e810edccfc9b8ebfef9b6d92bee819e51b08fbf3e3b8ab8afbc3b3c1e6
-
SHA512
7868a0d932633f09f00d63e344a86dfe8cc61d2662b6561b6bb1e36d154509138ae5db6b589461bad6d2f0537a0834914511b5c81f160a42aa75dff66757f311
-
SSDEEP
196608:20P38G01sgsN08CPmEroCsXn5jhPfcQu8X/VlgDF06lrDW/uMQuM7v+Lv:W11s/NHCPm2s3PsRm7M7v+Lv
Static task
static1
Behavioral task
behavioral1
Sample
81c435459e8b8d24e144d33e924eac92_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
vivounionapk_v4.2.4.0_d74cb3a_201808271150_signed_aligned.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral3
Sample
vivounionsdk.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral4
Sample
vivounionsdk.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral5
Sample
vivounionsdk.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Targets
-
-
Target
81c435459e8b8d24e144d33e924eac92_JaffaCakes118
-
Size
9.8MB
-
MD5
81c435459e8b8d24e144d33e924eac92
-
SHA1
94533622319010b58871fcdde27f0b48f05c5b58
-
SHA256
4e8a56e810edccfc9b8ebfef9b6d92bee819e51b08fbf3e3b8ab8afbc3b3c1e6
-
SHA512
7868a0d932633f09f00d63e344a86dfe8cc61d2662b6561b6bb1e36d154509138ae5db6b589461bad6d2f0537a0834914511b5c81f160a42aa75dff66757f311
-
SSDEEP
196608:20P38G01sgsN08CPmEroCsXn5jhPfcQu8X/VlgDF06lrDW/uMQuM7v+Lv:W11s/NHCPm2s3PsRm7M7v+Lv
Score7/10-
Checks Android system properties for emulator presence.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
-
-
Target
vivounionapk_v4.2.4.0_d74cb3a_201808271150_signed_aligned.vua
-
Size
4.2MB
-
MD5
3200674229ed57cf762fc3d8c5137b55
-
SHA1
0896d5f138545dc9ddbf0003518880d745c8fe0e
-
SHA256
333ee74803ab4b114d6217250623869c751a00f4748c826c19ffcd7b29476195
-
SHA512
31c96314a2b0d80ef3d6c04c0a6894b6a8ebff7e501fd48499ea0e12969ba4ac00cdd844caf839a16cdcffa5b51ee2f33af36a578dfd450c79c7e2bbc0c521ff
-
SSDEEP
98304:aQn4W5hESDzkY18DTTcDPPIKGPBhFI+sqFkSOO:aQ4W5hEIkg8DTTcDPPIK+HFknO
Score7/10-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
-
-
Target
vivounionsdk.res
-
Size
29KB
-
MD5
7a92466708fa1ae45c5585a5b986f5aa
-
SHA1
e9e8e0dc60208b7a8b64a65550442a73f1166c30
-
SHA256
cc8416f87003538f2c8ea5280a7eaebfb40597b6ebdcc33c4fa64b0cf08d3b73
-
SHA512
026dec17ed60d89257c8cb7873a0ccc0de910aad6706f1bbb7936229d7074b9542b7b80a2040f466c64e6cf8896e8531ee01ed7acbfa6a7ed90637a5fe2d477d
-
SSDEEP
384:RAhiLwh2JKStCYi7PSSDq41bVjDIcRy3ftLYHiLaBsKFj+C:RAV2wYnSDqojDIcsfiHiG3l
Score1/10 -