General
-
Target
533808a52a50a756872fb4729783fee0_JaffaCakes118
-
Size
3.3MB
-
Sample
240518-gda5baeb4x
-
MD5
533808a52a50a756872fb4729783fee0
-
SHA1
3423f37ac1ecf7fca25fa7c605be6b1d81bfcdab
-
SHA256
7b8cf4e86acf4218634c83a0bf1e0bf9a99f8eb766e21663e68c17ea39cc36e7
-
SHA512
8a169b9ffcb32cf82fea5e7d2599eaf80015214a4f6f157d63cd76f3d8c727b2582a1859e1dd2b556e05dc85740d32466a34ce782c4bd7a4d04a13825b48397c
-
SSDEEP
98304:SsT2L2LQChWe2XPTnszLBzE1TpYpf9zygnHTfup8OtywXL3yyczIHl:SsTo2LQChz4szLBzEBpYpFzfr0
Static task
static1
Behavioral task
behavioral1
Sample
533808a52a50a756872fb4729783fee0_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
533808a52a50a756872fb4729783fee0_JaffaCakes118.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral3
Sample
533808a52a50a756872fb4729783fee0_JaffaCakes118.apk
Resource
android-x64-arm64-20240514-en
Malware Config
Targets
-
-
Target
533808a52a50a756872fb4729783fee0_JaffaCakes118
-
Size
3.3MB
-
MD5
533808a52a50a756872fb4729783fee0
-
SHA1
3423f37ac1ecf7fca25fa7c605be6b1d81bfcdab
-
SHA256
7b8cf4e86acf4218634c83a0bf1e0bf9a99f8eb766e21663e68c17ea39cc36e7
-
SHA512
8a169b9ffcb32cf82fea5e7d2599eaf80015214a4f6f157d63cd76f3d8c727b2582a1859e1dd2b556e05dc85740d32466a34ce782c4bd7a4d04a13825b48397c
-
SSDEEP
98304:SsT2L2LQChWe2XPTnszLBzE1TpYpf9zygnHTfup8OtywXL3yyczIHl:SsTo2LQChz4szLBzEBpYpFzfr0
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-
Schedules tasks to execute at a specified time
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
-