General
-
Target
0edf973d0bc1fe71f50ce210f5316049_JaffaCakes118
-
Size
31.8MB
-
Sample
240502-ssza8sbg7v
-
MD5
0edf973d0bc1fe71f50ce210f5316049
-
SHA1
417b95f1dfd60f74cb3fdb4dffc1608016503242
-
SHA256
b1814886d85b45976eea938de66434f8506dd35a27c2b90eda33c3cec88c1c59
-
SHA512
7535eb1275113b036d07e82931dd1d33bd3e469809f19326b84f1897c36d87c5b24201d02e12b37c4b2049c0ffbd3450bd73709d634217e43519c84381913802
-
SSDEEP
786432:9G5ft4fOLU6+eEOqw6/afGy3ZTnzJ0B0e/xNzKnD8hD+tGW3TFA:shufq1pZqSuIzQ0wcmiZ2
Static task
static1
Behavioral task
behavioral1
Sample
0edf973d0bc1fe71f50ce210f5316049_JaffaCakes118.apk
Resource
android-x86-arm-20240221-en
Malware Config
Targets
-
-
Target
0edf973d0bc1fe71f50ce210f5316049_JaffaCakes118
-
Size
31.8MB
-
MD5
0edf973d0bc1fe71f50ce210f5316049
-
SHA1
417b95f1dfd60f74cb3fdb4dffc1608016503242
-
SHA256
b1814886d85b45976eea938de66434f8506dd35a27c2b90eda33c3cec88c1c59
-
SHA512
7535eb1275113b036d07e82931dd1d33bd3e469809f19326b84f1897c36d87c5b24201d02e12b37c4b2049c0ffbd3450bd73709d634217e43519c84381913802
-
SSDEEP
786432:9G5ft4fOLU6+eEOqw6/afGy3ZTnzJ0B0e/xNzKnD8hD+tGW3TFA:shufq1pZqSuIzQ0wcmiZ2
Score7/10-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-