General
-
Target
69066badc7ae34f00ecd788248cdd194_JaffaCakes118
-
Size
17.2MB
-
Sample
240522-3nxa7ade63
-
MD5
69066badc7ae34f00ecd788248cdd194
-
SHA1
1df21ff8ee5463afdeaf07a5fd076b4bafc02332
-
SHA256
c4c8fa94abd00d21983eb319e42b372db12530dec3dda4bf4157291728eef3e4
-
SHA512
a43fad1f22e304c3989e5e6b176e1eb7385203da2c0c1a4d27d95406f93a97dda2c87f97022789f9be440e860f04b522a4f5cc4bba85d96eb0059981c55ac680
-
SSDEEP
393216:M1MRLYFy9X3jytQiyR/mVXGJLcZdXy/uj6FfQ3et/phygDC7F10qjT:OMKA9XTQQpuVWGdC7+Ot/phyg61hT
Static task
static1
Behavioral task
behavioral1
Sample
69066badc7ae34f00ecd788248cdd194_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
69066badc7ae34f00ecd788248cdd194_JaffaCakes118.apk
Resource
android-x64-20240514-en
Malware Config
Targets
-
-
Target
69066badc7ae34f00ecd788248cdd194_JaffaCakes118
-
Size
17.2MB
-
MD5
69066badc7ae34f00ecd788248cdd194
-
SHA1
1df21ff8ee5463afdeaf07a5fd076b4bafc02332
-
SHA256
c4c8fa94abd00d21983eb319e42b372db12530dec3dda4bf4157291728eef3e4
-
SHA512
a43fad1f22e304c3989e5e6b176e1eb7385203da2c0c1a4d27d95406f93a97dda2c87f97022789f9be440e860f04b522a4f5cc4bba85d96eb0059981c55ac680
-
SSDEEP
393216:M1MRLYFy9X3jytQiyR/mVXGJLcZdXy/uj6FfQ3et/phygDC7F10qjT:OMKA9XTQQpuVWGdC7+Ot/phyg61hT
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Queries the unique device ID (IMEI, MEID, IMSI)
-