General
-
Target
0ffd4124786d4eef3eb4611b217d19a8_JaffaCakes118
-
Size
29.2MB
-
Sample
240503-jc424saa4x
-
MD5
0ffd4124786d4eef3eb4611b217d19a8
-
SHA1
a7af2714c43fa52a3634cfcd8b120d3e9567110e
-
SHA256
d4a068fb20501d18a5d55c7ce5aee30e4130e380cba8c9fc0e969d701f46bcbb
-
SHA512
b883b1dd9adb4e1ca84c9a0cf6c81c167f9d290ee7047d155afaf1306a7d0482f53d6c1c183d578f234f70cc35eed44e6079ae2327c58ce285a7cb7ec32833dd
-
SSDEEP
786432:96Q07tmga9twC3Ct//up/WUt3FkmM+oe2n:96Q6totwC3Ct//+/9rkmMBn
Static task
static1
Behavioral task
behavioral1
Sample
0ffd4124786d4eef3eb4611b217d19a8_JaffaCakes118.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
0ffd4124786d4eef3eb4611b217d19a8_JaffaCakes118.apk
Resource
android-x64-arm64-20240221-en
Malware Config
Targets
-
-
Target
0ffd4124786d4eef3eb4611b217d19a8_JaffaCakes118
-
Size
29.2MB
-
MD5
0ffd4124786d4eef3eb4611b217d19a8
-
SHA1
a7af2714c43fa52a3634cfcd8b120d3e9567110e
-
SHA256
d4a068fb20501d18a5d55c7ce5aee30e4130e380cba8c9fc0e969d701f46bcbb
-
SHA512
b883b1dd9adb4e1ca84c9a0cf6c81c167f9d290ee7047d155afaf1306a7d0482f53d6c1c183d578f234f70cc35eed44e6079ae2327c58ce285a7cb7ec32833dd
-
SSDEEP
786432:96Q07tmga9twC3Ct//up/WUt3FkmM+oe2n:96Q6totwC3Ct//+/9rkmMBn
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-