General
-
Target
63df8a1b60d13264c0dbb3a7bb7dd33c_JaffaCakes118
-
Size
2.4MB
-
Sample
240521-teaamabb8v
-
MD5
63df8a1b60d13264c0dbb3a7bb7dd33c
-
SHA1
1c525971e2e66731a9402b4aa1252ca52be041b1
-
SHA256
64c0a43eb56ef1293944aecc21da3fc94e12d78f5560ac3cc069b2849da1e80c
-
SHA512
7ac64cd5f1ec38055d51cb3a537fcaeb24bcbf2945dd753096d951199eb39f6d261adefaac880f44929c85c56e307ac7b0d153401d6fbd35bf6970d6babb3a7a
-
SSDEEP
49152:Ud2ZpfP/+6plv5L7MuUWL/IF+g6Rf8+cHqyi1tqmx1sahZkLDGZYrYWo+:Jb3/rplxCWx5bcd8t5xWIZkLD2Wo+
Static task
static1
Behavioral task
behavioral1
Sample
63df8a1b60d13264c0dbb3a7bb7dd33c_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
63df8a1b60d13264c0dbb3a7bb7dd33c_JaffaCakes118.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral3
Sample
63df8a1b60d13264c0dbb3a7bb7dd33c_JaffaCakes118.apk
Resource
android-x64-arm64-20240514-en
Malware Config
Targets
-
-
Target
63df8a1b60d13264c0dbb3a7bb7dd33c_JaffaCakes118
-
Size
2.4MB
-
MD5
63df8a1b60d13264c0dbb3a7bb7dd33c
-
SHA1
1c525971e2e66731a9402b4aa1252ca52be041b1
-
SHA256
64c0a43eb56ef1293944aecc21da3fc94e12d78f5560ac3cc069b2849da1e80c
-
SHA512
7ac64cd5f1ec38055d51cb3a537fcaeb24bcbf2945dd753096d951199eb39f6d261adefaac880f44929c85c56e307ac7b0d153401d6fbd35bf6970d6babb3a7a
-
SSDEEP
49152:Ud2ZpfP/+6plv5L7MuUWL/IF+g6Rf8+cHqyi1tqmx1sahZkLDGZYrYWo+:Jb3/rplxCWx5bcd8t5xWIZkLD2Wo+
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-
Schedules tasks to execute at a specified time
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
-