General
-
Target
2903ec8ce9f59a07de476a056debf51d_JaffaCakes118
-
Size
3.9MB
-
Sample
240509-jsx9hagc9z
-
MD5
2903ec8ce9f59a07de476a056debf51d
-
SHA1
c444c46e10eab94d72abb4a2cd6a765a9b20dc9e
-
SHA256
45dfaec5bfaff58d8c863826e568b1588178ae8ec14cb6806707cf63bb432c1d
-
SHA512
4641ae999692efc08548c6e949f38a484621bb190cde353fac99b0636a921814b9c42ac1e43ce4c2933b67921097407e10dc879e92698b1d43470878225de6cd
-
SSDEEP
98304:hUy6KgXJ14og4K6gbN3KOYp3PRCBA9oDDmpqe30Y7pNt5gKXX:hUyn2J14oSYNGBUH3Zt5t
Static task
static1
Behavioral task
behavioral1
Sample
2903ec8ce9f59a07de476a056debf51d_JaffaCakes118.apk
Resource
android-x86-arm-20240506-en
Behavioral task
behavioral2
Sample
2903ec8ce9f59a07de476a056debf51d_JaffaCakes118.apk
Resource
android-x64-20240506-en
Malware Config
Targets
-
-
Target
2903ec8ce9f59a07de476a056debf51d_JaffaCakes118
-
Size
3.9MB
-
MD5
2903ec8ce9f59a07de476a056debf51d
-
SHA1
c444c46e10eab94d72abb4a2cd6a765a9b20dc9e
-
SHA256
45dfaec5bfaff58d8c863826e568b1588178ae8ec14cb6806707cf63bb432c1d
-
SHA512
4641ae999692efc08548c6e949f38a484621bb190cde353fac99b0636a921814b9c42ac1e43ce4c2933b67921097407e10dc879e92698b1d43470878225de6cd
-
SSDEEP
98304:hUy6KgXJ14og4K6gbN3KOYp3PRCBA9oDDmpqe30Y7pNt5gKXX:hUyn2J14oSYNGBUH3Zt5t
Score7/10-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-
Schedules tasks to execute at a specified time
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
-