General
-
Target
542a4cbf34236057d7ca20272437926c_JaffaCakes118
-
Size
30.1MB
-
Sample
240518-lw94kseb33
-
MD5
542a4cbf34236057d7ca20272437926c
-
SHA1
c40cfdf8d2ba7102a903bd1dbfc0b50a17f247ab
-
SHA256
1a6406938b957b036a8f7586496b76ac9258a74e226298fc18e2933d188cea07
-
SHA512
82fed5db5cd680b78957d30b087fa5df115bc889ef01b0b783f29cfe9db4b6b4491fb8f122c5fb1df20485a739cfef455f661d8457012ed7562c224fe077d50a
-
SSDEEP
786432:zkHe1xIC7HuVMl7IJgCZPoqsEQikCP+YnUwCfQHoLv5:P1yC7HuigggPoqsB/CP+OUwMd
Static task
static1
Behavioral task
behavioral1
Sample
542a4cbf34236057d7ca20272437926c_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
542a4cbf34236057d7ca20272437926c_JaffaCakes118
-
Size
30.1MB
-
MD5
542a4cbf34236057d7ca20272437926c
-
SHA1
c40cfdf8d2ba7102a903bd1dbfc0b50a17f247ab
-
SHA256
1a6406938b957b036a8f7586496b76ac9258a74e226298fc18e2933d188cea07
-
SHA512
82fed5db5cd680b78957d30b087fa5df115bc889ef01b0b783f29cfe9db4b6b4491fb8f122c5fb1df20485a739cfef455f661d8457012ed7562c224fe077d50a
-
SSDEEP
786432:zkHe1xIC7HuVMl7IJgCZPoqsEQikCP+YnUwCfQHoLv5:P1yC7HuigggPoqsB/CP+OUwMd
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Reads information about phone network operator.
-
Schedules tasks to execute at a specified time
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
-