General
-
Target
346aa2fff72cfae8208771c4d3154066_JaffaCakes118
-
Size
30.2MB
-
Sample
240511-ntnhxaed9z
-
MD5
346aa2fff72cfae8208771c4d3154066
-
SHA1
182963b5880c7552cd8b2aac20a68e404da2db89
-
SHA256
cdc65e4f71e8f4ca094bd2da188b274e254c65da18d36e67ff220bc0ef4fbdf1
-
SHA512
b6f351a95119265600c6317061401ad331a2041ba586d4949f87382a4a79eb5dd5963a8ac3502f35ac658b2fa6e16437200c3db088aeb332f267964541c42ea1
-
SSDEEP
786432:RkQv81FIC7bKFMPfw1Yf4afPsE+9n9MvWYIqLQTvX3S:Rk1GC7bKS+Yf4afPsLx9MuYIrS
Static task
static1
Behavioral task
behavioral1
Sample
346aa2fff72cfae8208771c4d3154066_JaffaCakes118.apk
Resource
android-x86-arm-20240506-en
Malware Config
Targets
-
-
Target
346aa2fff72cfae8208771c4d3154066_JaffaCakes118
-
Size
30.2MB
-
MD5
346aa2fff72cfae8208771c4d3154066
-
SHA1
182963b5880c7552cd8b2aac20a68e404da2db89
-
SHA256
cdc65e4f71e8f4ca094bd2da188b274e254c65da18d36e67ff220bc0ef4fbdf1
-
SHA512
b6f351a95119265600c6317061401ad331a2041ba586d4949f87382a4a79eb5dd5963a8ac3502f35ac658b2fa6e16437200c3db088aeb332f267964541c42ea1
-
SSDEEP
786432:RkQv81FIC7bKFMPfw1Yf4afPsE+9n9MvWYIqLQTvX3S:Rk1GC7bKS+Yf4afPsLx9MuYIrS
Score7/10-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Reads information about phone network operator.
-
Schedules tasks to execute at a specified time
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
-