General
-
Target
50d4948797c7f5d1f8e26cbd0b9d6614_JaffaCakes118
-
Size
30.3MB
-
Sample
240517-wxgtjacc4v
-
MD5
50d4948797c7f5d1f8e26cbd0b9d6614
-
SHA1
e62f5991d41674694496b741d79051b1b2a0f549
-
SHA256
62ac3761a65381959543ce4a4abcb1657dca63aadf0852f85f773566a11eadd0
-
SHA512
f1c3d70568498b6bdf5515342e5d962a48086486312f6e1d1fa4a3bcab5679ce0b47ee2431bca8f019be07f41603d75859f49c3b1cc7c2b55b0ab90a1a47436f
-
SSDEEP
786432:6eV+WXvXOukEvIdh3ebG/7MbenRd61Eu2G7OKz53ly6pOany:6ewQXMEQL3ebG/7kEu2eh3Ny
Static task
static1
Behavioral task
behavioral1
Sample
50d4948797c7f5d1f8e26cbd0b9d6614_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
50d4948797c7f5d1f8e26cbd0b9d6614_JaffaCakes118
-
Size
30.3MB
-
MD5
50d4948797c7f5d1f8e26cbd0b9d6614
-
SHA1
e62f5991d41674694496b741d79051b1b2a0f549
-
SHA256
62ac3761a65381959543ce4a4abcb1657dca63aadf0852f85f773566a11eadd0
-
SHA512
f1c3d70568498b6bdf5515342e5d962a48086486312f6e1d1fa4a3bcab5679ce0b47ee2431bca8f019be07f41603d75859f49c3b1cc7c2b55b0ab90a1a47436f
-
SSDEEP
786432:6eV+WXvXOukEvIdh3ebG/7MbenRd61Eu2G7OKz53ly6pOany:6ewQXMEQL3ebG/7kEu2eh3Ny
-
Queries account information for other applications stored on the device
Application may abuse the framework's APIs to collect account information stored on the device.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Acquires the wake lock
-
Checks if the internet connection is available
-
Reads information about phone network operator.
-
Schedules tasks to execute at a specified time
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
-