General
-
Target
c7af3ed32ab5539871e76c7ebe6ec17f_JaffaCakes118
-
Size
22.6MB
-
Sample
240828-1cr6zsxbpg
-
MD5
c7af3ed32ab5539871e76c7ebe6ec17f
-
SHA1
3706e663a688a4307591596c85c9de6fe6c17342
-
SHA256
252b9b314c9eff59fc6b3f7909832551d5dd0b83984777c3608a1f5e013fd9e6
-
SHA512
560fa56f704cd00156aface956113a23e428bf0b291323aa1c44a25d36032f4945bfba0be2bcfc657c10a89994836316badd4b62c0e1b82410d8e6160904fd93
-
SSDEEP
393216:vyek18SWuKRuCc0SB9ggqumdr8KM+KyQjBZUYOq++Bsp6vXqIIcyYTsBXz0EHRdr:K12tzcr0u4rrM+KHjHf++BjvVyVBQdC
Static task
static1
Behavioral task
behavioral1
Sample
c7af3ed32ab5539871e76c7ebe6ec17f_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
APPayAssistEx.apk
Resource
android-x86-arm-20240624-en
Malware Config
Targets
-
-
Target
c7af3ed32ab5539871e76c7ebe6ec17f_JaffaCakes118
-
Size
22.6MB
-
MD5
c7af3ed32ab5539871e76c7ebe6ec17f
-
SHA1
3706e663a688a4307591596c85c9de6fe6c17342
-
SHA256
252b9b314c9eff59fc6b3f7909832551d5dd0b83984777c3608a1f5e013fd9e6
-
SHA512
560fa56f704cd00156aface956113a23e428bf0b291323aa1c44a25d36032f4945bfba0be2bcfc657c10a89994836316badd4b62c0e1b82410d8e6160904fd93
-
SSDEEP
393216:vyek18SWuKRuCc0SB9ggqumdr8KM+KyQjBZUYOq++Bsp6vXqIIcyYTsBXz0EHRdr:K12tzcr0u4rrM+KHjHf++BjvVyVBQdC
Score1/10 -
-
-
Target
APPayAssistEx.apk
-
Size
4.0MB
-
MD5
3bfb3edc54b8d32dafd5fe9ed5615319
-
SHA1
552465aa16d30e433d09feaeafa05eabce2f74a3
-
SHA256
9a70a8109a9850ae8a0079292628e07433c20c40978031c1622f38e3f0580866
-
SHA512
6bfbc611341bd1b15bde892c73887b092af5b012644f9441073a09078fb412ff519da407a55c493113d645216b85846dc1ac11f94161f469c9d4fdb5daadd967
-
SSDEEP
98304:IOjG3/bhysOBt9Ob7sHTlwMamz+UcYZLEjUjvgo:PjubNz3aTqMa+ZwYjIo
Score8/10-
Checks if the Android device is rooted.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-