General
-
Target
461ea8557e21f992f429544424cb15ee_JaffaCakes118
-
Size
8.1MB
-
Sample
240515-pc1btagh59
-
MD5
461ea8557e21f992f429544424cb15ee
-
SHA1
dfbe7843d2b65f198ce94727fdbea0e14973351e
-
SHA256
9a4e6b395bbfc447d66b7575bd3e6de1e32221bc2e45c65f90106d30a5657147
-
SHA512
803522fdd31e0a31df0d4519add1f1d29bce093dc5d288aa589ab9970718028a156b0ae62713406b2b459d6e8771d03e2971f704bb7f8e0042b0fe7b19c1a1cf
-
SSDEEP
196608:YZn1ESThV/q2sJgD2CVpYlVqf/wTZYL0SxjNa9lWYIzFg3HF43Tswm:i1PTh82sJgekIY0SxZIlW3zFmOsh
Static task
static1
Behavioral task
behavioral1
Sample
461ea8557e21f992f429544424cb15ee_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
461ea8557e21f992f429544424cb15ee_JaffaCakes118
-
Size
8.1MB
-
MD5
461ea8557e21f992f429544424cb15ee
-
SHA1
dfbe7843d2b65f198ce94727fdbea0e14973351e
-
SHA256
9a4e6b395bbfc447d66b7575bd3e6de1e32221bc2e45c65f90106d30a5657147
-
SHA512
803522fdd31e0a31df0d4519add1f1d29bce093dc5d288aa589ab9970718028a156b0ae62713406b2b459d6e8771d03e2971f704bb7f8e0042b0fe7b19c1a1cf
-
SSDEEP
196608:YZn1ESThV/q2sJgD2CVpYlVqf/wTZYL0SxjNa9lWYIzFg3HF43Tswm:i1PTh82sJgekIY0SxZIlW3zFmOsh
Score7/10-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-