General
-
Target
87bf01a404083758a702c1d85f5f452c_JaffaCakes118
-
Size
41.8MB
-
Sample
241102-zxvxyaykar
-
MD5
87bf01a404083758a702c1d85f5f452c
-
SHA1
5b9367d7c24d239f46a435bcbe8fa9e80563c8c3
-
SHA256
ce6ff92f592646059126bfccaf433bb1ac3301dd07265d4bd4c6e4a7ce05115f
-
SHA512
1cf9ed0064a9b3ea59cab66e0ebf341184ff1b927c46fb06f559f189b42f08d1f90cb294da44236bae06f0c206e64c01fe2dc95f6c667a381e04a481964cc742
-
SSDEEP
786432:phCAr/Q0s2ROoHzNs3YX7xsAULlbKJ8u43toZaD3FSmZ94PVXKztKqWn:phCATXs2RhNsoX7vULlb3LD3FSY94x2i
Static task
static1
Behavioral task
behavioral1
Sample
87bf01a404083758a702c1d85f5f452c_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
gamebox.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral3
Sample
gamebox.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral4
Sample
gamebox.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Targets
-
-
Target
87bf01a404083758a702c1d85f5f452c_JaffaCakes118
-
Size
41.8MB
-
MD5
87bf01a404083758a702c1d85f5f452c
-
SHA1
5b9367d7c24d239f46a435bcbe8fa9e80563c8c3
-
SHA256
ce6ff92f592646059126bfccaf433bb1ac3301dd07265d4bd4c6e4a7ce05115f
-
SHA512
1cf9ed0064a9b3ea59cab66e0ebf341184ff1b927c46fb06f559f189b42f08d1f90cb294da44236bae06f0c206e64c01fe2dc95f6c667a381e04a481964cc742
-
SSDEEP
786432:phCAr/Q0s2ROoHzNs3YX7xsAULlbKJ8u43toZaD3FSmZ94PVXKztKqWn:phCATXs2RhNsoX7vULlb3LD3FSY94x2i
Score7/10-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
-
-
Target
gamebox.apk
-
Size
1.7MB
-
MD5
fc76d2f2593de86bfb1e3f030b37e6fa
-
SHA1
e27026a53a51a0823c8d4eb6b70b4d6377f530f5
-
SHA256
913d4d664cd5872f03470505f751ed1e303531d1c667497d297923acc01409fd
-
SHA512
b8a510ac6d45998e21be3d817df091123e21d73695b2059f1510491e6be818e299a80aa9b53d914f7d1160e9e920211acdfc79054360e989d366270b050a7df0
-
SSDEEP
49152:N2AtOK4P7HSB1IhZNQwfyeq552L6YBoru:N2iOK48+hZNu5EmYMu
Score1/10 -