General
-
Target
63efd24b07605ad9d3ce9d35e38657fa_JaffaCakes118
-
Size
16.6MB
-
Sample
240521-ts5zfsbe63
-
MD5
63efd24b07605ad9d3ce9d35e38657fa
-
SHA1
ac7fa3eef0d71e15f2c81035bcd7dcbb20d4edad
-
SHA256
ff8a8cc17acf2ec9b58bb4ba89d1b1a3fadca81e42fe48efc573e093ae7421cc
-
SHA512
86a9648fa292b5b34296865b99797ea2210707bafd0138f5da1f86a444f25debbe9edf3b816dc9447d6f52d332bfc49079db94358db484ee4bc1595c20e45814
-
SSDEEP
393216:uwzOYmYzhBaWTHUXJsEC8eSdIkamSc1S8WEc2kkV5Q:3yYrDDjoQSuFci3kV5Q
Static task
static1
Behavioral task
behavioral1
Sample
63efd24b07605ad9d3ce9d35e38657fa_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
63efd24b07605ad9d3ce9d35e38657fa_JaffaCakes118.apk
Resource
android-x64-20240514-en
Malware Config
Targets
-
-
Target
63efd24b07605ad9d3ce9d35e38657fa_JaffaCakes118
-
Size
16.6MB
-
MD5
63efd24b07605ad9d3ce9d35e38657fa
-
SHA1
ac7fa3eef0d71e15f2c81035bcd7dcbb20d4edad
-
SHA256
ff8a8cc17acf2ec9b58bb4ba89d1b1a3fadca81e42fe48efc573e093ae7421cc
-
SHA512
86a9648fa292b5b34296865b99797ea2210707bafd0138f5da1f86a444f25debbe9edf3b816dc9447d6f52d332bfc49079db94358db484ee4bc1595c20e45814
-
SSDEEP
393216:uwzOYmYzhBaWTHUXJsEC8eSdIkamSc1S8WEc2kkV5Q:3yYrDDjoQSuFci3kV5Q
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Queries the unique device ID (IMEI, MEID, IMSI)
-