General
-
Target
63f5b3e70623fa11bc82e3d71523ba85_JaffaCakes118
-
Size
328KB
-
Sample
240521-typ57abg8w
-
MD5
63f5b3e70623fa11bc82e3d71523ba85
-
SHA1
db1a0a7662a91fe409cc006c8a86c89fc8275b27
-
SHA256
d9648402587e722419ad9ed8f113e6706e7ceda56a2994121e3c2f2c6fd192e9
-
SHA512
cc09bda79e842cf4887cfa15957bf0db8ed5ac2c1960c932ab1fd5fb9012334b43e0eda6ddf39753cd30fd0db0fb8531b842dbafeee0716d24bdd33958cfc97f
-
SSDEEP
6144:2e3wxpMexgY+jarjdLMCW1zjU/buPXsFwsDDGcZtVjcs+7xs:2PxpV++hNUMSPZQqcftky
Static task
static1
Behavioral task
behavioral1
Sample
63f5b3e70623fa11bc82e3d71523ba85_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
63f5b3e70623fa11bc82e3d71523ba85_JaffaCakes118.apk
Resource
android-x64-20240514-en
Malware Config
Targets
-
-
Target
63f5b3e70623fa11bc82e3d71523ba85_JaffaCakes118
-
Size
328KB
-
MD5
63f5b3e70623fa11bc82e3d71523ba85
-
SHA1
db1a0a7662a91fe409cc006c8a86c89fc8275b27
-
SHA256
d9648402587e722419ad9ed8f113e6706e7ceda56a2994121e3c2f2c6fd192e9
-
SHA512
cc09bda79e842cf4887cfa15957bf0db8ed5ac2c1960c932ab1fd5fb9012334b43e0eda6ddf39753cd30fd0db0fb8531b842dbafeee0716d24bdd33958cfc97f
-
SSDEEP
6144:2e3wxpMexgY+jarjdLMCW1zjU/buPXsFwsDDGcZtVjcs+7xs:2PxpV++hNUMSPZQqcftky
Score8/10-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-