General
-
Target
0321b28708951f45a3003174fe865118_JaffaCakes118
-
Size
10.4MB
-
Sample
240427-ndldlshh9z
-
MD5
0321b28708951f45a3003174fe865118
-
SHA1
27ee1e20643699846d4cba62e0b27bebd0c29f9e
-
SHA256
6bf8c03f30cc2eac0f0302d1cbc2f870b366e61dfa5f803843577fa27341483b
-
SHA512
eeb743b696180c5deb53d6f577c47ca5369f4b94790ca2425fd12de2cc721ba2eaac2b730284e81881cf05e123c7fcfbc515b274eda1c4462205b8ec88c2f361
-
SSDEEP
196608:7qNO3G3twS892PTpVkgnjAxpMu8tuoTCE8xn6t1Ly21px/JYqrY:mNOUtuEPTpjjAxpM1tuDY1pxRYN
Static task
static1
Behavioral task
behavioral1
Sample
0321b28708951f45a3003174fe865118_JaffaCakes118.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
0321b28708951f45a3003174fe865118_JaffaCakes118.apk
Resource
android-x64-20240221-en
Malware Config
Targets
-
-
Target
0321b28708951f45a3003174fe865118_JaffaCakes118
-
Size
10.4MB
-
MD5
0321b28708951f45a3003174fe865118
-
SHA1
27ee1e20643699846d4cba62e0b27bebd0c29f9e
-
SHA256
6bf8c03f30cc2eac0f0302d1cbc2f870b366e61dfa5f803843577fa27341483b
-
SHA512
eeb743b696180c5deb53d6f577c47ca5369f4b94790ca2425fd12de2cc721ba2eaac2b730284e81881cf05e123c7fcfbc515b274eda1c4462205b8ec88c2f361
-
SSDEEP
196608:7qNO3G3twS892PTpVkgnjAxpMu8tuoTCE8xn6t1Ly21px/JYqrY:mNOUtuEPTpjjAxpM1tuDY1pxRYN
Score7/10-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-