General
-
Target
63b1d4b072a6dc26e912296925233be5_JaffaCakes118
-
Size
4.7MB
-
Sample
240521-r97hhahg8w
-
MD5
63b1d4b072a6dc26e912296925233be5
-
SHA1
af7b6943f913a9b8f27f29af3f56ba1a56fdfadf
-
SHA256
b1fd16e54426538fa9b69bab4ecad7433a31efee28914805bf0b48e741bf03f9
-
SHA512
791d2bfc237cc96bd568d9bf4871aa40858b0db9b47462581e12de87707f1d69a52d0bad3d44ee0ab09a3c21743a09ac6778a4d56c48a9dd5d3a36f9b7abf5ef
-
SSDEEP
98304:HHafc4//i3tWaVgFaX36mkuKPVmP37yZUJKMtXVbCdo1ilc268fSJRX++5XO:HHI/iBKFaXSUGZUKMrnw626tvXfA
Static task
static1
Behavioral task
behavioral1
Sample
63b1d4b072a6dc26e912296925233be5_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
63b1d4b072a6dc26e912296925233be5_JaffaCakes118.apk
Resource
android-x64-20240514-en
Malware Config
Targets
-
-
Target
63b1d4b072a6dc26e912296925233be5_JaffaCakes118
-
Size
4.7MB
-
MD5
63b1d4b072a6dc26e912296925233be5
-
SHA1
af7b6943f913a9b8f27f29af3f56ba1a56fdfadf
-
SHA256
b1fd16e54426538fa9b69bab4ecad7433a31efee28914805bf0b48e741bf03f9
-
SHA512
791d2bfc237cc96bd568d9bf4871aa40858b0db9b47462581e12de87707f1d69a52d0bad3d44ee0ab09a3c21743a09ac6778a4d56c48a9dd5d3a36f9b7abf5ef
-
SSDEEP
98304:HHafc4//i3tWaVgFaX36mkuKPVmP37yZUJKMtXVbCdo1ilc268fSJRX++5XO:HHI/iBKFaXSUGZUKMrnw626tvXfA
Score8/10-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries information about the current nearby Wi-Fi networks
Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-