General
-
Target
4b3558a7df4fd618b3dfb843f49d2a9f_JaffaCakes118
-
Size
12.3MB
-
Sample
241016-dym3tszfne
-
MD5
4b3558a7df4fd618b3dfb843f49d2a9f
-
SHA1
f88f6431b9ec4653875737f7127ae463a38f1592
-
SHA256
f67f6b9ae0caa88fa51171d0acafaeabc98855828a9b6978fe1bbfab53fc6818
-
SHA512
59814bd47c31edaabb9c6eb644f1008d89f0c6cd482408a7db8119b1cc84ab09a6170ff3a68a70e39a62ace4f5e7061d9db90d659a6dab07c491619fd2796548
-
SSDEEP
196608:hG6cgK39kSOjcTkY8tlXxKXXCXLNe1bvM+ZWD0mOaYWAvNE/qLfDv52n:BK3Clj0b8tzuy4bvM+ZU0mONE/qLfD0n
Static task
static1
Behavioral task
behavioral1
Sample
4b3558a7df4fd618b3dfb843f49d2a9f_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
alipay_msp-3.5.2-1000261.apk
Resource
android-x86-arm-20240624-en
Malware Config
Targets
-
-
Target
4b3558a7df4fd618b3dfb843f49d2a9f_JaffaCakes118
-
Size
12.3MB
-
MD5
4b3558a7df4fd618b3dfb843f49d2a9f
-
SHA1
f88f6431b9ec4653875737f7127ae463a38f1592
-
SHA256
f67f6b9ae0caa88fa51171d0acafaeabc98855828a9b6978fe1bbfab53fc6818
-
SHA512
59814bd47c31edaabb9c6eb644f1008d89f0c6cd482408a7db8119b1cc84ab09a6170ff3a68a70e39a62ace4f5e7061d9db90d659a6dab07c491619fd2796548
-
SSDEEP
196608:hG6cgK39kSOjcTkY8tlXxKXXCXLNe1bvM+ZWD0mOaYWAvNE/qLfDv52n:BK3Clj0b8tzuy4bvM+ZU0mONE/qLfD0n
Score7/10-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries the phone number (MSISDN for GSM devices)
-
Queries information about active data network
-
-
-
Target
alipay_msp-3.5.2-1000261.apk
-
Size
332KB
-
MD5
17c548f15a7c90375b94bc3a56025a1a
-
SHA1
46b2d0dbde500c2417b6438e8ecb2dc32dffd37b
-
SHA256
14c5526a13cefa6d82095df76cd4f0445962911b607cbdb72a9c3ad0117b6868
-
SHA512
5ae294dd9426d421426ab7cebbed04b5ad327dcb801044528ae8eaded04a70fe2372b26dbf63aa8c5d687b09cede52207e1d608f115beeac10b9f11e0793dfc8
-
SSDEEP
6144:cBMjVfYqEF229WaIDNFM9wzfkRdGSrfPVX12GHBNd02vpbQTN1xUS52fnzmgvV:csVfOF229WjjfkbGUHdT10I6N1eS52f1
Score1/10 -