General
-
Target
1eddcb9c1e97b4b0f4c932b19a206063_JaffaCakes118
-
Size
9.5MB
-
Sample
240507-a1791aaf3y
-
MD5
1eddcb9c1e97b4b0f4c932b19a206063
-
SHA1
fcb7c8672e14b3f8edb73b3e7d7a47001a1607fc
-
SHA256
c118746c2657f65b806f18e8f5787c30dbb010769fa73f080d827af5276a581c
-
SHA512
7a30885094d52b1ec44c27613eca203060e15452ec65fd7897d4d8bf65451eef168e5a822c73bbf524abc902917db69d3c45b628c5e552e9befa2cb6c6642df1
-
SSDEEP
196608:yxp5b6OhHfvJYmnWhZMGf8Di4dtGAtQr8J5ZW3wO/6ki4nK:yxVnsf8DtdtPFFWAOSkM
Static task
static1
Behavioral task
behavioral1
Sample
1eddcb9c1e97b4b0f4c932b19a206063_JaffaCakes118.apk
Resource
android-x86-arm-20240506-en
Malware Config
Targets
-
-
Target
1eddcb9c1e97b4b0f4c932b19a206063_JaffaCakes118
-
Size
9.5MB
-
MD5
1eddcb9c1e97b4b0f4c932b19a206063
-
SHA1
fcb7c8672e14b3f8edb73b3e7d7a47001a1607fc
-
SHA256
c118746c2657f65b806f18e8f5787c30dbb010769fa73f080d827af5276a581c
-
SHA512
7a30885094d52b1ec44c27613eca203060e15452ec65fd7897d4d8bf65451eef168e5a822c73bbf524abc902917db69d3c45b628c5e552e9befa2cb6c6642df1
-
SSDEEP
196608:yxp5b6OhHfvJYmnWhZMGf8Di4dtGAtQr8J5ZW3wO/6ki4nK:yxVnsf8DtdtPFFWAOSkM
Score7/10-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the phone number (MSISDN for GSM devices)
-
Reads the content of the SMS messages.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Acquires the wake lock
-
Checks if the internet connection is available
-
Reads information about phone network operator.
-