General
-
Target
6326765f46d7ed1a875d0cf47a959749_JaffaCakes118
-
Size
6.8MB
-
Sample
240521-nqnz9scb6v
-
MD5
6326765f46d7ed1a875d0cf47a959749
-
SHA1
189bde520086d6619b1d0166587095ceed886e3a
-
SHA256
a2fc2738e91a3b30e63e79074f65b485a88f7cf7c60361726360adba28d760ba
-
SHA512
c25c664488087ef6dc0bbd232618c4ed201b25292e48a7e57b9e80507a16d01e8514b2c5b8c2abc3ff49b8dccaabc7643d936b3c1b2f45e78678147a60696349
-
SSDEEP
196608:eI1BSmTTjwcx8j9yASKszdcq4r9llJzk6alyJjVswlXSo:R1BS4Tjwv9yASKszdcqC9llpkiPr1
Static task
static1
Behavioral task
behavioral1
Sample
6326765f46d7ed1a875d0cf47a959749_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
6326765f46d7ed1a875d0cf47a959749_JaffaCakes118
-
Size
6.8MB
-
MD5
6326765f46d7ed1a875d0cf47a959749
-
SHA1
189bde520086d6619b1d0166587095ceed886e3a
-
SHA256
a2fc2738e91a3b30e63e79074f65b485a88f7cf7c60361726360adba28d760ba
-
SHA512
c25c664488087ef6dc0bbd232618c4ed201b25292e48a7e57b9e80507a16d01e8514b2c5b8c2abc3ff49b8dccaabc7643d936b3c1b2f45e78678147a60696349
-
SSDEEP
196608:eI1BSmTTjwcx8j9yASKszdcq4r9llJzk6alyJjVswlXSo:R1BS4Tjwv9yASKszdcqC9llpkiPr1
Score8/10-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-