General
-
Target
33bf811c0cd6cf4adc2f6363e93ca3df_JaffaCakes118
-
Size
30.1MB
-
Sample
240511-kp6l5sce55
-
MD5
33bf811c0cd6cf4adc2f6363e93ca3df
-
SHA1
98393367f8d7fb7ebb2cdfa754135ef6ca672c5e
-
SHA256
4de631f582fa4a85129cb5093d9c6a0d8af20b02240d643f3e1fe425ac55ddab
-
SHA512
21c69b5d005b69ee8c7d7e80e1b15aa4fe6dcbca950207429b4042d669293ad6bf7ac17acafbde5cffca0770fccaf3efc099c529c0ba4d18b6af78b73be478e3
-
SSDEEP
786432:JXcCW1LIC73mOM0wiBiRZP2qsEYgjAB4EZImAQfS2Un:J+18C73m9Wi/P2qsRSABFZIXR
Static task
static1
Behavioral task
behavioral1
Sample
33bf811c0cd6cf4adc2f6363e93ca3df_JaffaCakes118.apk
Resource
android-x86-arm-20240506-en
Malware Config
Targets
-
-
Target
33bf811c0cd6cf4adc2f6363e93ca3df_JaffaCakes118
-
Size
30.1MB
-
MD5
33bf811c0cd6cf4adc2f6363e93ca3df
-
SHA1
98393367f8d7fb7ebb2cdfa754135ef6ca672c5e
-
SHA256
4de631f582fa4a85129cb5093d9c6a0d8af20b02240d643f3e1fe425ac55ddab
-
SHA512
21c69b5d005b69ee8c7d7e80e1b15aa4fe6dcbca950207429b4042d669293ad6bf7ac17acafbde5cffca0770fccaf3efc099c529c0ba4d18b6af78b73be478e3
-
SSDEEP
786432:JXcCW1LIC73mOM0wiBiRZP2qsEYgjAB4EZImAQfS2Un:J+18C73m9Wi/P2qsRSABFZIXR
Score7/10-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Reads information about phone network operator.
-
Schedules tasks to execute at a specified time
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
-