General
-
Target
658732209be1e4caa0cb665d565634c7_JaffaCakes118
-
Size
12.5MB
-
Sample
240522-bwqd3aga67
-
MD5
658732209be1e4caa0cb665d565634c7
-
SHA1
fb1b035e193a72948cbd39809956914e87ae630d
-
SHA256
436235cd3bbe71e25bd091b284108efa40ae6dfae440c734072df2c9ed980b6a
-
SHA512
ebddad57dbcb475993d94dc72dfd80cd1f93f49079fb0d85752e902c6e59d91449dcc3fde3167388c393bb3eed667d7f14ed2bbefe951945fcaa9189c8157e61
-
SSDEEP
393216:ugkayoeUsZBiqs0Onl+PKhsEWJP6XgWVcfa:TkaDelIDl+PIsXZUcfa
Static task
static1
Behavioral task
behavioral1
Sample
658732209be1e4caa0cb665d565634c7_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
658732209be1e4caa0cb665d565634c7_JaffaCakes118.apk
Resource
android-x64-20240514-en
Malware Config
Targets
-
-
Target
658732209be1e4caa0cb665d565634c7_JaffaCakes118
-
Size
12.5MB
-
MD5
658732209be1e4caa0cb665d565634c7
-
SHA1
fb1b035e193a72948cbd39809956914e87ae630d
-
SHA256
436235cd3bbe71e25bd091b284108efa40ae6dfae440c734072df2c9ed980b6a
-
SHA512
ebddad57dbcb475993d94dc72dfd80cd1f93f49079fb0d85752e902c6e59d91449dcc3fde3167388c393bb3eed667d7f14ed2bbefe951945fcaa9189c8157e61
-
SSDEEP
393216:ugkayoeUsZBiqs0Onl+PKhsEWJP6XgWVcfa:TkaDelIDl+PIsXZUcfa
Score8/10-
Checks if the Android device is rooted.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Acquires the wake lock
-
Checks if the internet connection is available
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-