General
-
Target
facda20a68854afc6c041379a2438d84_JaffaCakes118
-
Size
8.6MB
-
Sample
240419-vy6zdaae76
-
MD5
facda20a68854afc6c041379a2438d84
-
SHA1
55659c64c8af48071f3d857818ebf7d67a4725b7
-
SHA256
67c7a6a4342690dd32de77e06b9df2b4977b3dd538314029a9dd476c39b21f6a
-
SHA512
598302413b55177c6665a4e9ad6428850e56fa4fd9233c19768bb16843db7242755a63c6edb0777f3a666d7fb28dedbf8091a8a822e00f0175940a4a1e1df7e0
-
SSDEEP
196608:gpTzMBtLY4FzW++ZxrzzucQsxua8WTqp4M2NIq9HYtGlIgc0E+S:gpTAt04Fz+Zxrzacdxua8WTqp4M2Nv83
Static task
static1
Behavioral task
behavioral1
Sample
facda20a68854afc6c041379a2438d84_JaffaCakes118.apk
Resource
android-x86-arm-20240221-en
Malware Config
Targets
-
-
Target
facda20a68854afc6c041379a2438d84_JaffaCakes118
-
Size
8.6MB
-
MD5
facda20a68854afc6c041379a2438d84
-
SHA1
55659c64c8af48071f3d857818ebf7d67a4725b7
-
SHA256
67c7a6a4342690dd32de77e06b9df2b4977b3dd538314029a9dd476c39b21f6a
-
SHA512
598302413b55177c6665a4e9ad6428850e56fa4fd9233c19768bb16843db7242755a63c6edb0777f3a666d7fb28dedbf8091a8a822e00f0175940a4a1e1df7e0
-
SSDEEP
196608:gpTzMBtLY4FzW++ZxrzzucQsxua8WTqp4M2NIq9HYtGlIgc0E+S:gpTAt04Fz+Zxrzacdxua8WTqp4M2Nv83
Score8/10-
Checks Android system properties for emulator presence.
-
Checks Qemu related system properties.
Checks for Android system properties related to Qemu for Emulator detection.
-
Checks known Qemu files.
Checks for known Qemu files that exist on Android virtual device images.
-
Checks known Qemu pipes.
Checks for known pipes used by the Android emulator to communicate with the host.
-
Queries information about running processes on the device.
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection.
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Reads information about phone network operator.
-