General
-
Target
d1e818d515302837684c149ed73ef92c_JaffaCakes118
-
Size
17.9MB
-
Sample
240405-m4lavsaf45
-
MD5
d1e818d515302837684c149ed73ef92c
-
SHA1
b7f38084a857a9ee384fa1a09c8dd83c5e67f6c9
-
SHA256
607f9debd6105265be00bb3e53307765222b8915082d8b6e44d1a9d74861dc72
-
SHA512
d7f4dbacbadb90b99316b775a63655be7dbd83460d7a0da7d767e37c11b8d16c82afa5deec4d3eeb3a8e7483b8f641bf5fca011320c65707bb51013ff8ba6888
-
SSDEEP
393216:ZONPXBL3FFxnm1ucDS+N6cP+r2tF9Y83E7gf/dgmRYtjD:ZO5xpm1dbNLF9RUc2mWtH
Static task
static1
Behavioral task
behavioral1
Sample
d1e818d515302837684c149ed73ef92c_JaffaCakes118.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
d1e818d515302837684c149ed73ef92c_JaffaCakes118.apk
Resource
android-x64-20240221-en
Malware Config
Targets
-
-
Target
d1e818d515302837684c149ed73ef92c_JaffaCakes118
-
Size
17.9MB
-
MD5
d1e818d515302837684c149ed73ef92c
-
SHA1
b7f38084a857a9ee384fa1a09c8dd83c5e67f6c9
-
SHA256
607f9debd6105265be00bb3e53307765222b8915082d8b6e44d1a9d74861dc72
-
SHA512
d7f4dbacbadb90b99316b775a63655be7dbd83460d7a0da7d767e37c11b8d16c82afa5deec4d3eeb3a8e7483b8f641bf5fca011320c65707bb51013ff8ba6888
-
SSDEEP
393216:ZONPXBL3FFxnm1ucDS+N6cP+r2tF9Y83E7gf/dgmRYtjD:ZO5xpm1dbNLF9RUc2mWtH
-
Queries information about running processes on the device.
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Reads information about phone network operator.
-