General
-
Target
61d4966d9715a251baa1de75c925d913_JaffaCakes118
-
Size
24.5MB
-
Sample
240521-dkl9daff43
-
MD5
61d4966d9715a251baa1de75c925d913
-
SHA1
521055b75a89361c4f979e853d6f841115c13ecb
-
SHA256
da7e8d476aaafc7b11074d74e5f97e77d9b7998a752d228de3f2cb019d813c40
-
SHA512
e3a18a4a6ad6b0fa0c8c1c8a3b5c28ccb218338f47b626c567b9c636522e5579b2d4fd56ffa08762ff785df6dfe3dcf37ec15f7dada5385d42c025ee83a4c7ac
-
SSDEEP
786432:WXq0wm/1cnPSFPQV8gw4LTXS6XMoW3hYOx:WXtzSShQO74L26XS3Wi
Static task
static1
Behavioral task
behavioral1
Sample
61d4966d9715a251baa1de75c925d913_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
61d4966d9715a251baa1de75c925d913_JaffaCakes118.apk
Resource
android-x64-20240514-en
Malware Config
Targets
-
-
Target
61d4966d9715a251baa1de75c925d913_JaffaCakes118
-
Size
24.5MB
-
MD5
61d4966d9715a251baa1de75c925d913
-
SHA1
521055b75a89361c4f979e853d6f841115c13ecb
-
SHA256
da7e8d476aaafc7b11074d74e5f97e77d9b7998a752d228de3f2cb019d813c40
-
SHA512
e3a18a4a6ad6b0fa0c8c1c8a3b5c28ccb218338f47b626c567b9c636522e5579b2d4fd56ffa08762ff785df6dfe3dcf37ec15f7dada5385d42c025ee83a4c7ac
-
SSDEEP
786432:WXq0wm/1cnPSFPQV8gw4LTXS6XMoW3hYOx:WXtzSShQO74L26XS3Wi
Score7/10-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Reads information about phone network operator.
-