General
-
Target
65865d3149fd4df49359fcac49dfde5f_JaffaCakes118
-
Size
2.4MB
-
Sample
240522-bv7lysgb9v
-
MD5
65865d3149fd4df49359fcac49dfde5f
-
SHA1
eedef61f6bc1cb48771e80d4f962b8ad4469567b
-
SHA256
181c481d413988035e16c14a89376367a10be98d320167a2658a2db66056ed7a
-
SHA512
3d507b88363bd4bac9eb8314231630afa0115b84d8eb6a76fecb7b75a03889dff2659876a2b462beee0265ab5de7007a540eacc710b734a9587601bcf43e48b1
-
SSDEEP
49152:Ud2ZpfP/+6plv5L7MuUWL/IF+g6Rf8+cHqyi1tqmx1sahZkLDGZYrYWom:Jb3/rplxCWx5bcd8t5xWIZkLD2Wom
Static task
static1
Behavioral task
behavioral1
Sample
65865d3149fd4df49359fcac49dfde5f_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
65865d3149fd4df49359fcac49dfde5f_JaffaCakes118.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral3
Sample
65865d3149fd4df49359fcac49dfde5f_JaffaCakes118.apk
Resource
android-x64-arm64-20240514-en
Malware Config
Targets
-
-
Target
65865d3149fd4df49359fcac49dfde5f_JaffaCakes118
-
Size
2.4MB
-
MD5
65865d3149fd4df49359fcac49dfde5f
-
SHA1
eedef61f6bc1cb48771e80d4f962b8ad4469567b
-
SHA256
181c481d413988035e16c14a89376367a10be98d320167a2658a2db66056ed7a
-
SHA512
3d507b88363bd4bac9eb8314231630afa0115b84d8eb6a76fecb7b75a03889dff2659876a2b462beee0265ab5de7007a540eacc710b734a9587601bcf43e48b1
-
SSDEEP
49152:Ud2ZpfP/+6plv5L7MuUWL/IF+g6Rf8+cHqyi1tqmx1sahZkLDGZYrYWom:Jb3/rplxCWx5bcd8t5xWIZkLD2Wom
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-
Schedules tasks to execute at a specified time
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
-