General
-
Target
3c380c5680781a6fd70609f5f7f514d4_JaffaCakes118
-
Size
7.0MB
-
Sample
240513-w7mgrsha9y
-
MD5
3c380c5680781a6fd70609f5f7f514d4
-
SHA1
9b64a42c15825ff1683c06d4d584ac0fb050fadd
-
SHA256
56d7666c12f687b81b04d88ad8b9e62dc49d4be3e12e520f847f38828cb0ae5a
-
SHA512
80d25fcc18815e55889d2f93f80761e1fa48fdff6778c56a4bfe2261ec53c24ef43e0c77830f7cbab83245071df21f60ebe1616e0c6da6450173c54f5b15c612
-
SSDEEP
196608:IR0HVLZ6iNpEmXk06EcRc0PvyvMBIuEIVkV:WCVAavXYEcR7v8M+aVK
Static task
static1
Behavioral task
behavioral1
Sample
3c380c5680781a6fd70609f5f7f514d4_JaffaCakes118.apk
Resource
android-x86-arm-20240506-en
Malware Config
Targets
-
-
Target
3c380c5680781a6fd70609f5f7f514d4_JaffaCakes118
-
Size
7.0MB
-
MD5
3c380c5680781a6fd70609f5f7f514d4
-
SHA1
9b64a42c15825ff1683c06d4d584ac0fb050fadd
-
SHA256
56d7666c12f687b81b04d88ad8b9e62dc49d4be3e12e520f847f38828cb0ae5a
-
SHA512
80d25fcc18815e55889d2f93f80761e1fa48fdff6778c56a4bfe2261ec53c24ef43e0c77830f7cbab83245071df21f60ebe1616e0c6da6450173c54f5b15c612
-
SSDEEP
196608:IR0HVLZ6iNpEmXk06EcRc0PvyvMBIuEIVkV:WCVAavXYEcR7v8M+aVK
Score7/10-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Reads information about phone network operator.
-