General
-
Target
54eac4cb267a2ee26165942548fe80c8_JaffaCakes118
-
Size
21.1MB
-
Sample
240518-ql4w2add2x
-
MD5
54eac4cb267a2ee26165942548fe80c8
-
SHA1
998441e26d506db08ebf9eb8c6270eb2089b9bfe
-
SHA256
87328403f86f04ddd622c23235e3d95bc18fee012394e58dde120368f6b273b0
-
SHA512
992c6830f09a28b5905060307d649840ccb79d4bf4181deb630502dc682f77ccbb9468d5f85ef3b5cb7af805c0064136c955d6282e931198b89132c2a6097192
-
SSDEEP
393216:XskIdIzut4lb2FMFu85DUju+cr4EmBG+HVa/nK/V/tNwRBdRsDBjpSGJ1lUI:+Outm2FS1pUvob+HVa/K/V/tNwjsVFSY
Static task
static1
Behavioral task
behavioral1
Sample
54eac4cb267a2ee26165942548fe80c8_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
54eac4cb267a2ee26165942548fe80c8_JaffaCakes118
-
Size
21.1MB
-
MD5
54eac4cb267a2ee26165942548fe80c8
-
SHA1
998441e26d506db08ebf9eb8c6270eb2089b9bfe
-
SHA256
87328403f86f04ddd622c23235e3d95bc18fee012394e58dde120368f6b273b0
-
SHA512
992c6830f09a28b5905060307d649840ccb79d4bf4181deb630502dc682f77ccbb9468d5f85ef3b5cb7af805c0064136c955d6282e931198b89132c2a6097192
-
SSDEEP
393216:XskIdIzut4lb2FMFu85DUju+cr4EmBG+HVa/nK/V/tNwRBdRsDBjpSGJ1lUI:+Outm2FS1pUvob+HVa/K/V/tNwjsVFSY
Score8/10-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries information about the current nearby Wi-Fi networks
Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Reads information about phone network operator.
-