General
-
Target
51cc6911945573a8c16497de1becbe37_JaffaCakes118
-
Size
220KB
-
Sample
240517-2c9xgaec7s
-
MD5
51cc6911945573a8c16497de1becbe37
-
SHA1
3e6fd5b55bcfc70c077f1f6baee9c20122e14118
-
SHA256
d0a073da9f6d2b87257a4117e9e741a12e0c52d32f04630e6af7991dd26af32f
-
SHA512
3485a0aae971083e83b641949d27453d9fee770dc6119e823b023e3fa106ac563ae7597be77229d7552edfa27be5635df033b371476e30121ca44e95432933a4
-
SSDEEP
6144:n4/SLME5p9QRfBFRuD7WA9XK5GYPmNdr+JhyUEApti:42MM9QBUD7b9r9f+Jhy9A2
Static task
static1
Behavioral task
behavioral1
Sample
51cc6911945573a8c16497de1becbe37_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
51cc6911945573a8c16497de1becbe37_JaffaCakes118.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral3
Sample
51cc6911945573a8c16497de1becbe37_JaffaCakes118.apk
Resource
android-x64-arm64-20240514-en
Malware Config
Targets
-
-
Target
51cc6911945573a8c16497de1becbe37_JaffaCakes118
-
Size
220KB
-
MD5
51cc6911945573a8c16497de1becbe37
-
SHA1
3e6fd5b55bcfc70c077f1f6baee9c20122e14118
-
SHA256
d0a073da9f6d2b87257a4117e9e741a12e0c52d32f04630e6af7991dd26af32f
-
SHA512
3485a0aae971083e83b641949d27453d9fee770dc6119e823b023e3fa106ac563ae7597be77229d7552edfa27be5635df033b371476e30121ca44e95432933a4
-
SSDEEP
6144:n4/SLME5p9QRfBFRuD7WA9XK5GYPmNdr+JhyUEApti:42MM9QBUD7b9r9f+Jhy9A2
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Reads the content of SMS inbox messages.
-
Tries to add a device administrator.
-
Acquires the wake lock
-