General
-
Target
690d92543c886a7fe6d6046554dd6021_JaffaCakes118
-
Size
30.1MB
-
Sample
240522-3vslksdh34
-
MD5
690d92543c886a7fe6d6046554dd6021
-
SHA1
e5785f4d77bdab2277a35934c5396b3ddfc0bc82
-
SHA256
03ab034a9af42d9674101800ec1cca343b6f72c4e3cd6fc4729a8dca111cef8b
-
SHA512
0c822112ee2e2b05d52a3b47e19a2452c3c1271ea128a356fbca19019f0adb32bc2cf0be23d9ffa084481237aac678af145e224c54da7a4aed8d35194e1ff138
-
SSDEEP
786432:wUoQPCduLsE7BIC7qzo0ZP3DSlOoFUcyMPFLs1f0d8:/LCGsaCC7qzouP3GjFUMP61X
Static task
static1
Behavioral task
behavioral1
Sample
690d92543c886a7fe6d6046554dd6021_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
690d92543c886a7fe6d6046554dd6021_JaffaCakes118
-
Size
30.1MB
-
MD5
690d92543c886a7fe6d6046554dd6021
-
SHA1
e5785f4d77bdab2277a35934c5396b3ddfc0bc82
-
SHA256
03ab034a9af42d9674101800ec1cca343b6f72c4e3cd6fc4729a8dca111cef8b
-
SHA512
0c822112ee2e2b05d52a3b47e19a2452c3c1271ea128a356fbca19019f0adb32bc2cf0be23d9ffa084481237aac678af145e224c54da7a4aed8d35194e1ff138
-
SSDEEP
786432:wUoQPCduLsE7BIC7qzo0ZP3DSlOoFUcyMPFLs1f0d8:/LCGsaCC7qzouP3GjFUMP61X
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Reads information about phone network operator.
-
Schedules tasks to execute at a specified time
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
-