General
-
Target
48ee2b012f4428b5313c1186dc242765_JaffaCakes118
-
Size
17.8MB
-
Sample
240516-btgzxadh9z
-
MD5
48ee2b012f4428b5313c1186dc242765
-
SHA1
b5ca98bcbfec0fbf4f9f9da66936411559318f6c
-
SHA256
7bcdc11c73154bd0a13f5ee3f0f936fd7b18f3ae9f095a20a5bc6b41dd2becec
-
SHA512
47f96422262e40d39b40b962ef4eeac1907e92cd0e2f3f21e9a0ec1502579765a238ee7e02ba937e7a08accd9456fcaf7294cbcc30b217b7e500545ecc1b463a
-
SSDEEP
393216:cTphMWmAJWd57zS47eBSTD8FbLj2y5gYJPNMrGIu+jMC:cTpCWVJWPfS4ywT4n2rYJPuc5C
Behavioral task
behavioral1
Sample
48ee2b012f4428b5313c1186dc242765_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
48ee2b012f4428b5313c1186dc242765_JaffaCakes118
-
Size
17.8MB
-
MD5
48ee2b012f4428b5313c1186dc242765
-
SHA1
b5ca98bcbfec0fbf4f9f9da66936411559318f6c
-
SHA256
7bcdc11c73154bd0a13f5ee3f0f936fd7b18f3ae9f095a20a5bc6b41dd2becec
-
SHA512
47f96422262e40d39b40b962ef4eeac1907e92cd0e2f3f21e9a0ec1502579765a238ee7e02ba937e7a08accd9456fcaf7294cbcc30b217b7e500545ecc1b463a
-
SSDEEP
393216:cTphMWmAJWd57zS47eBSTD8FbLj2y5gYJPNMrGIu+jMC:cTpCWVJWPfS4ywT4n2rYJPuc5C
Score7/10-
Queries account information for other applications stored on the device
Application may abuse the framework's APIs to collect account information stored on the device.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Listens for changes in the sensor environment (might be used to detect emulation)
-