General
-
Target
f5b2ceae8b0516d7439d33cdfca151b1_JaffaCakes118
-
Size
263KB
-
Sample
240417-nycl7sfc6t
-
MD5
f5b2ceae8b0516d7439d33cdfca151b1
-
SHA1
c484bf934b8a94ca6b0bff0df22e8bdad6b2209b
-
SHA256
c57ac81c1849d110c18f98505b628918b8e0f8b5defcecda7e9334001c065398
-
SHA512
663af1a4c3f8e0f3bbf9d33dfeda5b14ced9da5eb6af67e46b7dbddec4f4ed54ad0e63b64c15f6d956f135ca72dd17340114795726b168cf1b8b3fe11f823925
-
SSDEEP
6144:/PNvivXSCeVvnD2IJOsBFaw4IzEsS/ZXBc2Y4MT5fNg:Vi6tQIwsBFa/IvcR9Ug
Static task
static1
Behavioral task
behavioral1
Sample
f5b2ceae8b0516d7439d33cdfca151b1_JaffaCakes118.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
f5b2ceae8b0516d7439d33cdfca151b1_JaffaCakes118.apk
Resource
android-x64-20240221-en
Malware Config
Targets
-
-
Target
f5b2ceae8b0516d7439d33cdfca151b1_JaffaCakes118
-
Size
263KB
-
MD5
f5b2ceae8b0516d7439d33cdfca151b1
-
SHA1
c484bf934b8a94ca6b0bff0df22e8bdad6b2209b
-
SHA256
c57ac81c1849d110c18f98505b628918b8e0f8b5defcecda7e9334001c065398
-
SHA512
663af1a4c3f8e0f3bbf9d33dfeda5b14ced9da5eb6af67e46b7dbddec4f4ed54ad0e63b64c15f6d956f135ca72dd17340114795726b168cf1b8b3fe11f823925
-
SSDEEP
6144:/PNvivXSCeVvnD2IJOsBFaw4IzEsS/ZXBc2Y4MT5fNg:Vi6tQIwsBFa/IvcR9Ug
-
Queries account information for other applications stored on the device.
Application may abuse the framework's APIs to collect account information stored on the device.
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-