General
-
Target
54cb327d99be77ebcbd298743209e426_JaffaCakes118
-
Size
17.9MB
-
Sample
240518-p4cd3acc8y
-
MD5
54cb327d99be77ebcbd298743209e426
-
SHA1
d5e021177dfd113c02d4a3a8620eeeae4a9462bc
-
SHA256
2baa1ad9e0fab133cee08b346fa50685816a73405c6544c45caf674d6bb9b3d9
-
SHA512
1f5311a58ec0b8021517b0799672c5e349c03e0197ab9465cc591965e7d61afe200109eadb7d77ef7562d04ee19999ea9767821bc19f64b55abe084139d17695
-
SSDEEP
393216:ffV1hRpDQyFauwD73FmZU/lOO04swOlLM1iCf7xtx0zL5HAW4MPy1f:fffiyFjWVSYOEKMZfjxeD/kf
Static task
static1
Behavioral task
behavioral1
Sample
54cb327d99be77ebcbd298743209e426_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
54cb327d99be77ebcbd298743209e426_JaffaCakes118.apk
Resource
android-x64-20240514-en
Malware Config
Targets
-
-
Target
54cb327d99be77ebcbd298743209e426_JaffaCakes118
-
Size
17.9MB
-
MD5
54cb327d99be77ebcbd298743209e426
-
SHA1
d5e021177dfd113c02d4a3a8620eeeae4a9462bc
-
SHA256
2baa1ad9e0fab133cee08b346fa50685816a73405c6544c45caf674d6bb9b3d9
-
SHA512
1f5311a58ec0b8021517b0799672c5e349c03e0197ab9465cc591965e7d61afe200109eadb7d77ef7562d04ee19999ea9767821bc19f64b55abe084139d17695
-
SSDEEP
393216:ffV1hRpDQyFauwD73FmZU/lOO04swOlLM1iCf7xtx0zL5HAW4MPy1f:fffiyFjWVSYOEKMZfjxeD/kf
Score7/10-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Queries the unique device ID (IMEI, MEID, IMSI)
-