General
-
Target
51d62b16220dd51fed1a211b6688473a_JaffaCakes118
-
Size
20.9MB
-
Sample
241017-m9arbavckh
-
MD5
51d62b16220dd51fed1a211b6688473a
-
SHA1
7bb0672f59d2291c39a2f88a1e977a0d07f7372a
-
SHA256
e5f017ecb87f9e3083080b62ca590747279738e5eaaee151fe9bdf110c000974
-
SHA512
18139f48de734b30466dd272f250fb2ef7055fc1c99b9de244354f5fe098dec60d859ab4dd1dae28f3ae4faef31332cb9e98f89267c88cebc4c0ef57b4317409
-
SSDEEP
393216:gmmhK5PHBvkDWungDCdKCaeUpBuECJhaBoY1okZm5SFxSRILk+YTyJlxmW5MgdAS:WKFHBYWnNeUpwECrCo1kaSFxHoWJlxmi
Static task
static1
Behavioral task
behavioral1
Sample
51d62b16220dd51fed1a211b6688473a_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
org.qiyi.android.pay.qywallet.apk
Resource
android-x86-arm-20240624-en
Malware Config
Targets
-
-
Target
51d62b16220dd51fed1a211b6688473a_JaffaCakes118
-
Size
20.9MB
-
MD5
51d62b16220dd51fed1a211b6688473a
-
SHA1
7bb0672f59d2291c39a2f88a1e977a0d07f7372a
-
SHA256
e5f017ecb87f9e3083080b62ca590747279738e5eaaee151fe9bdf110c000974
-
SHA512
18139f48de734b30466dd272f250fb2ef7055fc1c99b9de244354f5fe098dec60d859ab4dd1dae28f3ae4faef31332cb9e98f89267c88cebc4c0ef57b4317409
-
SSDEEP
393216:gmmhK5PHBvkDWungDCdKCaeUpBuECJhaBoY1okZm5SFxSRILk+YTyJlxmW5MgdAS:WKFHBYWnNeUpwECrCo1kaSFxHoWJlxmi
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Reads information about phone network operator.
-
-
-
Target
org.qiyi.android.pay.qywallet.apk
-
Size
329KB
-
MD5
ac70f5844ed643612cb4b0dc5f6603b4
-
SHA1
5e66a6730aba1f27a7a3dd13ecadc02940b7476c
-
SHA256
45cf986fbd66a98a4ee78a28f39d17cfdff51aa6fbf644da742d87347678ed3b
-
SHA512
667ab531a8c55da4898652178adc652a73fbe7c0d75f611c36a94a24d6794645bc57ced48de9af24d6d720df824541d6baafb1f570482d6404456c13c2359bde
-
SSDEEP
6144:6AdA5O6c58KeQSyfZ/xCpDVWu+eChcsKHB2mSxmV:68AkkFlI/xCp5x+eAcBc5cV
Score1/10 -
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Virtualization/Sandbox Evasion
2System Checks
2