General
-
Target
6478d00b69e5c2561bd38d29f2813fa2_JaffaCakes118
-
Size
1.3MB
-
Sample
240521-x3vs1sfh4z
-
MD5
6478d00b69e5c2561bd38d29f2813fa2
-
SHA1
c9ae761853f981f359a466217cbee390f23fd97b
-
SHA256
43c9703326164f014bb317e79cd79585245259e18e6d4af32b7735b6da5dd2d6
-
SHA512
b0dca0d2c2008b1211197e6debf026c21f296e3834c28b6c1d9e35ab0d774f5b57e5ad54170071a845fd2b02d4abf520cbb90c66753f0fdf192c1353f8f4d105
-
SSDEEP
24576:loL0otaYtXMLeE2sepAvb6vsm0ZGpUvb+jno+G8jy9Wq/13tdHbZKm51Ob83B:2Q7YtcFeGv0sKUvb+jbPjy9Wq/1XHNKw
Static task
static1
Behavioral task
behavioral1
Sample
6478d00b69e5c2561bd38d29f2813fa2_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
6478d00b69e5c2561bd38d29f2813fa2_JaffaCakes118.apk
Resource
android-x64-20240514-en
Malware Config
Targets
-
-
Target
6478d00b69e5c2561bd38d29f2813fa2_JaffaCakes118
-
Size
1.3MB
-
MD5
6478d00b69e5c2561bd38d29f2813fa2
-
SHA1
c9ae761853f981f359a466217cbee390f23fd97b
-
SHA256
43c9703326164f014bb317e79cd79585245259e18e6d4af32b7735b6da5dd2d6
-
SHA512
b0dca0d2c2008b1211197e6debf026c21f296e3834c28b6c1d9e35ab0d774f5b57e5ad54170071a845fd2b02d4abf520cbb90c66753f0fdf192c1353f8f4d105
-
SSDEEP
24576:loL0otaYtXMLeE2sepAvb6vsm0ZGpUvb+jno+G8jy9Wq/13tdHbZKm51Ob83B:2Q7YtcFeGv0sKUvb+jbPjy9Wq/1XHNKw
-
Queries account information for other applications stored on the device
Application may abuse the framework's APIs to collect account information stored on the device.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-