General
-
Target
009ac8a9d0d57cba03450985483265a7_JaffaCakes118
-
Size
10.9MB
-
Sample
240426-mzqd1seh54
-
MD5
009ac8a9d0d57cba03450985483265a7
-
SHA1
4157cc71bfcc345159dd37664146dfb3bccea217
-
SHA256
796e50a130d011a3c7d68a20aca2c1a0d0c1823711523998897dcca3cc365c5c
-
SHA512
e65e0b475735641b7a0dbd141922e1bde6da782300ce74d6faef0fa1e11b8c4aaf40a22048ffd82d173d5b79dcc2f32c00e87f208e15151468f80f41209a0762
-
SSDEEP
196608:gj4ZTsHALf3uPcLnV93MtAfDqlZg+jMK+Dizlq6YTE3X6qRu6VcPvU7phmSaf4f7:BVqUDVRuA7K29K+Diz46YxkuGUv+qQE4
Static task
static1
Behavioral task
behavioral1
Sample
009ac8a9d0d57cba03450985483265a7_JaffaCakes118.apk
Resource
android-x86-arm-20240221-en
Malware Config
Targets
-
-
Target
009ac8a9d0d57cba03450985483265a7_JaffaCakes118
-
Size
10.9MB
-
MD5
009ac8a9d0d57cba03450985483265a7
-
SHA1
4157cc71bfcc345159dd37664146dfb3bccea217
-
SHA256
796e50a130d011a3c7d68a20aca2c1a0d0c1823711523998897dcca3cc365c5c
-
SHA512
e65e0b475735641b7a0dbd141922e1bde6da782300ce74d6faef0fa1e11b8c4aaf40a22048ffd82d173d5b79dcc2f32c00e87f208e15151468f80f41209a0762
-
SSDEEP
196608:gj4ZTsHALf3uPcLnV93MtAfDqlZg+jMK+Dizlq6YTE3X6qRu6VcPvU7phmSaf4f7:BVqUDVRuA7K29K+Diz46YxkuGUv+qQE4
Score7/10-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Acquires the wake lock
-
Checks if the internet connection is available
-
Reads information about phone network operator.
-