General
-
Target
f812d71460d7e7c545904c8c865ae372_JaffaCakes118
-
Size
18.0MB
-
Sample
240418-qjhwsaec43
-
MD5
f812d71460d7e7c545904c8c865ae372
-
SHA1
9a9e3a30888f08b78b981a5319803612ad0c6098
-
SHA256
ef17ca3f86dc95a6a33ea021e43409b035340ac73f8bd829a6a865b961e545a7
-
SHA512
3da3e784d383fabecde38bb640a207c18d7ec81388c2716e5e33f3bf8f53c8fa183f4aac89eb2b45f59c82d9f52a5d73b29e511d370d7606b049f89adf650c04
-
SSDEEP
393216:+NKMf1mAplwBcHUcd+r2tF9Ya3g7gf/dgSRYe3uB:+NKMf0ApyqHLF9Twc2SWes
Static task
static1
Behavioral task
behavioral1
Sample
f812d71460d7e7c545904c8c865ae372_JaffaCakes118.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
f812d71460d7e7c545904c8c865ae372_JaffaCakes118.apk
Resource
android-x64-arm64-20240221-en
Malware Config
Targets
-
-
Target
f812d71460d7e7c545904c8c865ae372_JaffaCakes118
-
Size
18.0MB
-
MD5
f812d71460d7e7c545904c8c865ae372
-
SHA1
9a9e3a30888f08b78b981a5319803612ad0c6098
-
SHA256
ef17ca3f86dc95a6a33ea021e43409b035340ac73f8bd829a6a865b961e545a7
-
SHA512
3da3e784d383fabecde38bb640a207c18d7ec81388c2716e5e33f3bf8f53c8fa183f4aac89eb2b45f59c82d9f52a5d73b29e511d370d7606b049f89adf650c04
-
SSDEEP
393216:+NKMf1mAplwBcHUcd+r2tF9Ya3g7gf/dgSRYe3uB:+NKMf0ApyqHLF9Twc2SWes
Score8/10-
Queries information about running processes on the device.
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection.
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-
Listens for changes in the sensor environment (might be used to detect emulation)
-