General
-
Target
33cabd0ff64a0e9ffa989af15d0d641b_JaffaCakes118
-
Size
30.3MB
-
Sample
240511-kx12maac8w
-
MD5
33cabd0ff64a0e9ffa989af15d0d641b
-
SHA1
09b165784ddd59f4ab5265b468cd0d994057a50d
-
SHA256
af28db2af862e286f32a335ec4ff274700bf1e37b12411d9ceb6ead6cef5989f
-
SHA512
f72845529f5a5872c75f734745fa34176c46c0ca144a396a6a7d31c171b8343438631d76ead6c81258d04c48b4571fc42ab7e215269a48ab67bc554cd79e218d
-
SSDEEP
786432:g8qg1bIC7/GeMxg6RCt4aovsEWVul8hwN4+EQnSCwM:B1MC7/GNdCt4aovszIl8CN49C
Static task
static1
Behavioral task
behavioral1
Sample
33cabd0ff64a0e9ffa989af15d0d641b_JaffaCakes118.apk
Resource
android-x86-arm-20240506-en
Malware Config
Targets
-
-
Target
33cabd0ff64a0e9ffa989af15d0d641b_JaffaCakes118
-
Size
30.3MB
-
MD5
33cabd0ff64a0e9ffa989af15d0d641b
-
SHA1
09b165784ddd59f4ab5265b468cd0d994057a50d
-
SHA256
af28db2af862e286f32a335ec4ff274700bf1e37b12411d9ceb6ead6cef5989f
-
SHA512
f72845529f5a5872c75f734745fa34176c46c0ca144a396a6a7d31c171b8343438631d76ead6c81258d04c48b4571fc42ab7e215269a48ab67bc554cd79e218d
-
SSDEEP
786432:g8qg1bIC7/GeMxg6RCt4aovsEWVul8hwN4+EQnSCwM:B1MC7/GNdCt4aovszIl8CN49C
Score7/10-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Reads information about phone network operator.
-
Schedules tasks to execute at a specified time
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
-