General
-
Target
56a35c23bc8554acf05058f19751088a_JaffaCakes118
-
Size
2.4MB
-
Sample
240518-y9yc6aeb2v
-
MD5
56a35c23bc8554acf05058f19751088a
-
SHA1
e4ee739378befee37cad558f1e5900f566ef7fab
-
SHA256
0a7cc29e92a43f6a7f80faffb8bd0d09ae8e670f3f6bbb63b5a1b73840553167
-
SHA512
51a9fa6f78d189da99282ea5865642a8c39049c9ebea59fdd72bef9438e2f28dbd3ea2e92637af81ade923448c88e03964aa5746f69cd27600f08e0933c5cc93
-
SSDEEP
49152:5uo5JtRCsqgHdg7pcYxRliLovrGt9sr5a8+UpIhHjC0nmWJBJfDq4wja90y:5uo5jJcxRliLWS85pgHjLhzGja9l
Static task
static1
Behavioral task
behavioral1
Sample
56a35c23bc8554acf05058f19751088a_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
56a35c23bc8554acf05058f19751088a_JaffaCakes118
-
Size
2.4MB
-
MD5
56a35c23bc8554acf05058f19751088a
-
SHA1
e4ee739378befee37cad558f1e5900f566ef7fab
-
SHA256
0a7cc29e92a43f6a7f80faffb8bd0d09ae8e670f3f6bbb63b5a1b73840553167
-
SHA512
51a9fa6f78d189da99282ea5865642a8c39049c9ebea59fdd72bef9438e2f28dbd3ea2e92637af81ade923448c88e03964aa5746f69cd27600f08e0933c5cc93
-
SSDEEP
49152:5uo5JtRCsqgHdg7pcYxRliLovrGt9sr5a8+UpIhHjC0nmWJBJfDq4wja90y:5uo5jJcxRliLWS85pgHjLhzGja9l
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-