General
-
Target
02b049b8c880bd99bdbb5b45bd5f2343_JaffaCakes118
-
Size
16.5MB
-
Sample
240427-hxrrvaeb6x
-
MD5
02b049b8c880bd99bdbb5b45bd5f2343
-
SHA1
088b2e2522760ad1e162b467a3d49165447df05b
-
SHA256
3d9085069ac029a45306d16ad45b7abbc0d69afacdcef218d02df614e27a1b5f
-
SHA512
b3084a7faad4eb2c555747ba3c2094ccc84c9fb713e81cbb4edc556aa0e5e2c8177c7b11f094dc3913ea22d91ecf503c1128be7e79fb5dc27ee66a1b7fac3029
-
SSDEEP
393216:1pPfwXAiPg+CCabhBuK/3TPu2tlcBku1awFgfvy:1pPfwXAiPDoHuyDul6i
Static task
static1
Behavioral task
behavioral1
Sample
02b049b8c880bd99bdbb5b45bd5f2343_JaffaCakes118.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
02b049b8c880bd99bdbb5b45bd5f2343_JaffaCakes118.apk
Resource
android-x64-20240221-en
Malware Config
Targets
-
-
Target
02b049b8c880bd99bdbb5b45bd5f2343_JaffaCakes118
-
Size
16.5MB
-
MD5
02b049b8c880bd99bdbb5b45bd5f2343
-
SHA1
088b2e2522760ad1e162b467a3d49165447df05b
-
SHA256
3d9085069ac029a45306d16ad45b7abbc0d69afacdcef218d02df614e27a1b5f
-
SHA512
b3084a7faad4eb2c555747ba3c2094ccc84c9fb713e81cbb4edc556aa0e5e2c8177c7b11f094dc3913ea22d91ecf503c1128be7e79fb5dc27ee66a1b7fac3029
-
SSDEEP
393216:1pPfwXAiPg+CCabhBuK/3TPu2tlcBku1awFgfvy:1pPfwXAiPDoHuyDul6i
Score8/10-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-