General
-
Target
ea2d239649ce5a6cd4a8d991f1416107_JaffaCakes118
-
Size
11.0MB
-
Sample
240409-rlwq4ahc43
-
MD5
ea2d239649ce5a6cd4a8d991f1416107
-
SHA1
5a8572d3e593d4e8bad748cd40f81ba5f13f57c4
-
SHA256
767b7ec6d30dfd7117f7ffb29764a1b92f0aa228f699e4ce6031e3590ff70a20
-
SHA512
0ce10cbf0bebbf181f53c0366552c94911dab1397ae8cc7e75d21f9152508352fc56751c9eaa092722b2ecee7819a05427047af2619d873b01a33a2306a3a22f
-
SSDEEP
196608:slHPedCEXYQkXPXbWVzIzxkOzvoLq1hjXUFtnJjFBylIQJjCHgColSK9a9eCC:slATk/XaGvkwjXUtJxq7MgDX9Ye1
Static task
static1
Malware Config
Targets
-
-
Target
ea2d239649ce5a6cd4a8d991f1416107_JaffaCakes118
-
Size
11.0MB
-
MD5
ea2d239649ce5a6cd4a8d991f1416107
-
SHA1
5a8572d3e593d4e8bad748cd40f81ba5f13f57c4
-
SHA256
767b7ec6d30dfd7117f7ffb29764a1b92f0aa228f699e4ce6031e3590ff70a20
-
SHA512
0ce10cbf0bebbf181f53c0366552c94911dab1397ae8cc7e75d21f9152508352fc56751c9eaa092722b2ecee7819a05427047af2619d873b01a33a2306a3a22f
-
SSDEEP
196608:slHPedCEXYQkXPXbWVzIzxkOzvoLq1hjXUFtnJjFBylIQJjCHgColSK9a9eCC:slATk/XaGvkwjXUtJxq7MgDX9Ye1
-
Checks Android system properties for emulator presence.
-
Queries information about running processes on the device.
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Reads information about phone network operator.
-