General
-
Target
6549a2a7999b12d82df68e05651d098e_JaffaCakes118
-
Size
3.3MB
-
Sample
240522-adbyaaed71
-
MD5
6549a2a7999b12d82df68e05651d098e
-
SHA1
3459a09f7acc33d13ab644907807292bd7e4da63
-
SHA256
255332e2c8e6d37fbf83551dc3c9ac0d421aa1ccbd5b0d1effa66d303b672667
-
SHA512
0d395d9d5b76e2cd7f301bf622e53cd74c3b33920bb03d307ab2fe9b8ce255c38462d02c3fddabf5169b184492a0f3d7a4e90a6f67c63b9b964642074d4c03ca
-
SSDEEP
98304:xugfuWWFkFL7EBasOqFRl8Fr24J73DwpwOtywXN3XWiBj3h:xvLWOLpEcJpXg
Static task
static1
Behavioral task
behavioral1
Sample
6549a2a7999b12d82df68e05651d098e_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
6549a2a7999b12d82df68e05651d098e_JaffaCakes118.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral3
Sample
6549a2a7999b12d82df68e05651d098e_JaffaCakes118.apk
Resource
android-x64-arm64-20240514-en
Malware Config
Targets
-
-
Target
6549a2a7999b12d82df68e05651d098e_JaffaCakes118
-
Size
3.3MB
-
MD5
6549a2a7999b12d82df68e05651d098e
-
SHA1
3459a09f7acc33d13ab644907807292bd7e4da63
-
SHA256
255332e2c8e6d37fbf83551dc3c9ac0d421aa1ccbd5b0d1effa66d303b672667
-
SHA512
0d395d9d5b76e2cd7f301bf622e53cd74c3b33920bb03d307ab2fe9b8ce255c38462d02c3fddabf5169b184492a0f3d7a4e90a6f67c63b9b964642074d4c03ca
-
SSDEEP
98304:xugfuWWFkFL7EBasOqFRl8Fr24J73DwpwOtywXN3XWiBj3h:xvLWOLpEcJpXg
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-
Schedules tasks to execute at a specified time
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
-