General
-
Target
60cd3f9f10104cf973ba51e0b02f4e91_JaffaCakes118
-
Size
8.3MB
-
Sample
240520-x7zb1adh58
-
MD5
60cd3f9f10104cf973ba51e0b02f4e91
-
SHA1
15f69feff4ba5884d0f2a3ac8458938f65a9df95
-
SHA256
5ed562d94fbe14e2c45c8ba09cb5ebeb16cb209fc5e71ed09a5cac61a356ffdf
-
SHA512
20786c0e5e21c5c80d82daf5c968aa4a823b1baf55a42fb418cc674dcae6e29f3cc5faefdaf362b786999ffd391b7b821db184eb0def9c5f92fddb517943d91e
-
SSDEEP
196608:SivvD15eBux6nDCYykESz2zNoYtgD3LK/uGcJ7asfWPWuFPlcd:9TXAWYy3Sz2zNntgD3m/FcMsu9Fed
Static task
static1
Behavioral task
behavioral1
Sample
60cd3f9f10104cf973ba51e0b02f4e91_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
60cd3f9f10104cf973ba51e0b02f4e91_JaffaCakes118
-
Size
8.3MB
-
MD5
60cd3f9f10104cf973ba51e0b02f4e91
-
SHA1
15f69feff4ba5884d0f2a3ac8458938f65a9df95
-
SHA256
5ed562d94fbe14e2c45c8ba09cb5ebeb16cb209fc5e71ed09a5cac61a356ffdf
-
SHA512
20786c0e5e21c5c80d82daf5c968aa4a823b1baf55a42fb418cc674dcae6e29f3cc5faefdaf362b786999ffd391b7b821db184eb0def9c5f92fddb517943d91e
-
SSDEEP
196608:SivvD15eBux6nDCYykESz2zNoYtgD3LK/uGcJ7asfWPWuFPlcd:9TXAWYy3Sz2zNntgD3m/FcMsu9Fed
Score8/10-
Checks if the Android device is rooted.
-
Checks known Qemu files.
Checks for known Qemu files that exist on Android virtual device images.
-
Checks known Qemu pipes.
Checks for known pipes used by the Android emulator to communicate with the host.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-