General
-
Target
4edb8464adf5feddc64376986c92485f_JaffaCakes118
-
Size
11.0MB
-
Sample
240517-hhsqlaed85
-
MD5
4edb8464adf5feddc64376986c92485f
-
SHA1
12f51440768acbd163f44f427bc9f670f1d17822
-
SHA256
3afb197f914c7e11a5d63f6632b1e3a9085d818bcd3cf18e51f82c24c0dc9195
-
SHA512
d43869a64d53f045566b74b3606d6a5db73170f028d5d9a4ff33e000cdac2894e4402ffdb360c8bc281d70263ba0dfb5487032f5319a3cdbbcda00676950b591
-
SSDEEP
196608:LGmUp2pRzko1oUIhyTqPhPEhYGNN9RNiXWJ+zyoNjfCccIdd8hMhcsISNk/rckXB:VUp2zzP1eyTMEuKpN6WJToNbCXUmYc/R
Behavioral task
behavioral1
Sample
4edb8464adf5feddc64376986c92485f_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
4edb8464adf5feddc64376986c92485f_JaffaCakes118.apk
Resource
android-x64-20240514-en
Malware Config
Extracted
joker
http://loc.map.baidu.com/offline_loc
Targets
-
-
Target
4edb8464adf5feddc64376986c92485f_JaffaCakes118
-
Size
11.0MB
-
MD5
4edb8464adf5feddc64376986c92485f
-
SHA1
12f51440768acbd163f44f427bc9f670f1d17822
-
SHA256
3afb197f914c7e11a5d63f6632b1e3a9085d818bcd3cf18e51f82c24c0dc9195
-
SHA512
d43869a64d53f045566b74b3606d6a5db73170f028d5d9a4ff33e000cdac2894e4402ffdb360c8bc281d70263ba0dfb5487032f5319a3cdbbcda00676950b591
-
SSDEEP
196608:LGmUp2pRzko1oUIhyTqPhPEhYGNN9RNiXWJ+zyoNjfCccIdd8hMhcsISNk/rckXB:VUp2zzP1eyTMEuKpN6WJToNbCXUmYc/R
Score8/10-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the phone number (MSISDN for GSM devices)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-