General
-
Target
50c6bd16143cfbd887c8417c5dee71a4_JaffaCakes118
-
Size
21.4MB
-
Sample
240517-wnsjnsbg97
-
MD5
50c6bd16143cfbd887c8417c5dee71a4
-
SHA1
4a50ab3b32103572935afd038bfcd8ed12518d82
-
SHA256
61970069c6ee613bac07b5dc712b8942ca1d56103a974f728f217720b453345d
-
SHA512
1e3bc59669575dddf7f06169286feb1e0ccee59b37003fb90034852eb803e71053ba83f7231eb6a45e69bbe4ac66757adddc4553d70981e0dee9d88b158df520
-
SSDEEP
393216:jSU7OEAGRnFUNbzOxPcGpWtzcQ0x+uuzVL3RhhW2ojcMA7+q1xzu:rdd56NAcGpUzCx+uOvQgMA7h1xzu
Static task
static1
Behavioral task
behavioral1
Sample
50c6bd16143cfbd887c8417c5dee71a4_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
50c6bd16143cfbd887c8417c5dee71a4_JaffaCakes118
-
Size
21.4MB
-
MD5
50c6bd16143cfbd887c8417c5dee71a4
-
SHA1
4a50ab3b32103572935afd038bfcd8ed12518d82
-
SHA256
61970069c6ee613bac07b5dc712b8942ca1d56103a974f728f217720b453345d
-
SHA512
1e3bc59669575dddf7f06169286feb1e0ccee59b37003fb90034852eb803e71053ba83f7231eb6a45e69bbe4ac66757adddc4553d70981e0dee9d88b158df520
-
SSDEEP
393216:jSU7OEAGRnFUNbzOxPcGpWtzcQ0x+uuzVL3RhhW2ojcMA7+q1xzu:rdd56NAcGpUzCx+uOvQgMA7h1xzu
Score8/10-
Checks if the Android device is rooted.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Reads information about phone network operator.
-