General
-
Target
68ce2b64305f4458b3b1f259c181912c_JaffaCakes118
-
Size
14.5MB
-
Sample
240522-118hwaaf5x
-
MD5
68ce2b64305f4458b3b1f259c181912c
-
SHA1
a547984caec6313f6ba7359cfda009268647067b
-
SHA256
489a9cb3e9f9ceaca3bb3e27a84acf3c21abcc5be686e98214296ae98eee4284
-
SHA512
9b598e476b9da11759a719dffdd0270d13788189f9db97b0ee42d0dd18dd16284613e8a9aa5f1e3575afe861c19cfa48095d7718d6d4881bc8043e41368c37ed
-
SSDEEP
393216:QmIse8nq4yNljPXAKf9UvvP42QZHjPB7u:QmIenqdzwKf9EPRQJs
Static task
static1
Behavioral task
behavioral1
Sample
68ce2b64305f4458b3b1f259c181912c_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
68ce2b64305f4458b3b1f259c181912c_JaffaCakes118
-
Size
14.5MB
-
MD5
68ce2b64305f4458b3b1f259c181912c
-
SHA1
a547984caec6313f6ba7359cfda009268647067b
-
SHA256
489a9cb3e9f9ceaca3bb3e27a84acf3c21abcc5be686e98214296ae98eee4284
-
SHA512
9b598e476b9da11759a719dffdd0270d13788189f9db97b0ee42d0dd18dd16284613e8a9aa5f1e3575afe861c19cfa48095d7718d6d4881bc8043e41368c37ed
-
SSDEEP
393216:QmIse8nq4yNljPXAKf9UvvP42QZHjPB7u:QmIenqdzwKf9EPRQJs
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the phone number (MSISDN for GSM devices)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Reads information about phone network operator.
-