General
-
Target
211e3597c48ed042d21e515aacfe998c_JaffaCakes118
-
Size
30.8MB
-
Sample
240507-vhm7bshg98
-
MD5
211e3597c48ed042d21e515aacfe998c
-
SHA1
04daebf6f9b6d4284010215721360b226e2cd905
-
SHA256
2a3b19f9027be319d63daac2bb95bb2c2e2e94cac6615746cdcac77e1cab5695
-
SHA512
8d2e961a592375671963bc71c2661890cfc7d843ac2d826b5fd6337cd0c0f82694ce0274ecb849d2baaac3869ab19a24db2d8f7770a4c0a3392bde02f4ffaf54
-
SSDEEP
786432:bnMBCB6yRsf813iFQqI3af8s25qVCqqZ5CamImW5qy0pE:bMBCRX1ScqgcCqqZWImWMyGE
Static task
static1
Behavioral task
behavioral1
Sample
211e3597c48ed042d21e515aacfe998c_JaffaCakes118.apk
Resource
android-x86-arm-20240506-en
Malware Config
Targets
-
-
Target
211e3597c48ed042d21e515aacfe998c_JaffaCakes118
-
Size
30.8MB
-
MD5
211e3597c48ed042d21e515aacfe998c
-
SHA1
04daebf6f9b6d4284010215721360b226e2cd905
-
SHA256
2a3b19f9027be319d63daac2bb95bb2c2e2e94cac6615746cdcac77e1cab5695
-
SHA512
8d2e961a592375671963bc71c2661890cfc7d843ac2d826b5fd6337cd0c0f82694ce0274ecb849d2baaac3869ab19a24db2d8f7770a4c0a3392bde02f4ffaf54
-
SSDEEP
786432:bnMBCB6yRsf813iFQqI3af8s25qVCqqZ5CamImW5qy0pE:bMBCRX1ScqgcCqqZWImWMyGE
Score7/10-
Checks Android system properties for emulator presence.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Acquires the wake lock
-
Checks if the internet connection is available
-
Reads information about phone network operator.
-