General
-
Target
3936153b6fec314797315ac7e7a2257e_JaffaCakes118
-
Size
9.7MB
-
Sample
240512-khj5kage41
-
MD5
3936153b6fec314797315ac7e7a2257e
-
SHA1
b38194afa9c747a2911c8ed2be6daf230a6f6924
-
SHA256
d649b07ee07f944ecd10e955d6edd0c998b54cf5542fe23905282ceddc70e74a
-
SHA512
3bd901436281869bd19b88b977abaf441cad0846c16dd1f252a9a0bfe7ed7f71d7af6e48ff0ecb4e4400b41d5ca3e1bd6d8b3046eb3bb27291765b84c94452b5
-
SSDEEP
196608:0x+jyRfmruRV40IcAWpFzFRJp99I4pyvZUSFQJpF1UrNGhJ1RxBPcAKx:0xGyRwuR2Nc9jJb9I42ySFYpANc1Rx9Y
Static task
static1
Behavioral task
behavioral1
Sample
3936153b6fec314797315ac7e7a2257e_JaffaCakes118.apk
Resource
android-x86-arm-20240506-en
Behavioral task
behavioral2
Sample
3936153b6fec314797315ac7e7a2257e_JaffaCakes118.apk
Resource
android-x64-20240506-en
Malware Config
Targets
-
-
Target
3936153b6fec314797315ac7e7a2257e_JaffaCakes118
-
Size
9.7MB
-
MD5
3936153b6fec314797315ac7e7a2257e
-
SHA1
b38194afa9c747a2911c8ed2be6daf230a6f6924
-
SHA256
d649b07ee07f944ecd10e955d6edd0c998b54cf5542fe23905282ceddc70e74a
-
SHA512
3bd901436281869bd19b88b977abaf441cad0846c16dd1f252a9a0bfe7ed7f71d7af6e48ff0ecb4e4400b41d5ca3e1bd6d8b3046eb3bb27291765b84c94452b5
-
SSDEEP
196608:0x+jyRfmruRV40IcAWpFzFRJp99I4pyvZUSFQJpF1UrNGhJ1RxBPcAKx:0xGyRwuR2Nc9jJb9I42ySFYpANc1Rx9Y
Score7/10-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Acquires the wake lock
-
Checks if the internet connection is available
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-