General
-
Target
347d8016a7a887939ea54e1e1ca13440_JaffaCakes118
-
Size
30.5MB
-
Sample
240511-n7xnqsfb3y
-
MD5
347d8016a7a887939ea54e1e1ca13440
-
SHA1
7d0409d63f739d4b7a0f609d7384e4d3311909a5
-
SHA256
46a51db7bc9bfe13cf27f4e49bcad42b24d01c5d46091f3fe76ce3f799546751
-
SHA512
a1bdf95f7cef527dee3109caa56f54e35e39889b3712c9eba02f23248032ee93bcd8367c86ed82a5007df2bdeb21c9efd2f203f107b01288e577d18dc3e6d3e1
-
SSDEEP
786432:qUwN1zIC73uIMiEWIqypW1ZP5+tsEab8vG7oTc2kQDT/3T:010C73uHjWTP56sT4vG0Tc67
Static task
static1
Behavioral task
behavioral1
Sample
347d8016a7a887939ea54e1e1ca13440_JaffaCakes118.apk
Resource
android-x86-arm-20240506-en
Malware Config
Targets
-
-
Target
347d8016a7a887939ea54e1e1ca13440_JaffaCakes118
-
Size
30.5MB
-
MD5
347d8016a7a887939ea54e1e1ca13440
-
SHA1
7d0409d63f739d4b7a0f609d7384e4d3311909a5
-
SHA256
46a51db7bc9bfe13cf27f4e49bcad42b24d01c5d46091f3fe76ce3f799546751
-
SHA512
a1bdf95f7cef527dee3109caa56f54e35e39889b3712c9eba02f23248032ee93bcd8367c86ed82a5007df2bdeb21c9efd2f203f107b01288e577d18dc3e6d3e1
-
SSDEEP
786432:qUwN1zIC73uIMiEWIqypW1ZP5+tsEab8vG7oTc2kQDT/3T:010C73uHjWTP56sT4vG0Tc67
Score7/10-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Reads information about phone network operator.
-
Schedules tasks to execute at a specified time
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
-