General
-
Target
58fc5eb4889db44673cbc8ca4ca6a478_JaffaCakes118
-
Size
16.1MB
-
Sample
240519-g7jnjsed4z
-
MD5
58fc5eb4889db44673cbc8ca4ca6a478
-
SHA1
ca27decee537be14972657aaa4e3693f86e6d4f4
-
SHA256
02f3842cd9756caca1c5f3e575a1e4f16ece55830881b1ae25068940cabaca26
-
SHA512
9a0c5889e70c0487faca607ac9c347f20c63b79c145c0b8b0729471984a29ed73e90b2cc77ac46f1a1b6cc06367aa34fcbb00e4b8a9841c56dafaee8f554c0ad
-
SSDEEP
393216:so7lt+KVb0H/7OIPXo42DtMqq097P3BF/oU9n/x8YnB:7t+Ob0H/zT2Dtr993Z5BB
Static task
static1
Behavioral task
behavioral1
Sample
58fc5eb4889db44673cbc8ca4ca6a478_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
58fc5eb4889db44673cbc8ca4ca6a478_JaffaCakes118.apk
Resource
android-x64-arm64-20240514-en
Malware Config
Targets
-
-
Target
58fc5eb4889db44673cbc8ca4ca6a478_JaffaCakes118
-
Size
16.1MB
-
MD5
58fc5eb4889db44673cbc8ca4ca6a478
-
SHA1
ca27decee537be14972657aaa4e3693f86e6d4f4
-
SHA256
02f3842cd9756caca1c5f3e575a1e4f16ece55830881b1ae25068940cabaca26
-
SHA512
9a0c5889e70c0487faca607ac9c347f20c63b79c145c0b8b0729471984a29ed73e90b2cc77ac46f1a1b6cc06367aa34fcbb00e4b8a9841c56dafaee8f554c0ad
-
SSDEEP
393216:so7lt+KVb0H/7OIPXo42DtMqq097P3BF/oU9n/x8YnB:7t+Ob0H/zT2Dtr993Z5BB
Score8/10-
Checks if the Android device is rooted.
-
Checks known Qemu files.
Checks for known Qemu files that exist on Android virtual device images.
-
Checks known Qemu pipes.
Checks for known pipes used by the Android emulator to communicate with the host.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-