General
-
Target
65aa8c4e3e86038466da82c4ee61ef20_JaffaCakes118
-
Size
18.8MB
-
Sample
240522-cr3dhahb89
-
MD5
65aa8c4e3e86038466da82c4ee61ef20
-
SHA1
06abfef7bfb587fc37a06b58a1fa8ab2448c0b6c
-
SHA256
6e8ffb457c755929741a683783401c1a57d1b67f7a53c94fb60cb1b4b85340b1
-
SHA512
ed27177f6f2dbcb94394c8b8f6c74c10049b5c973658c2cba3f96491488b156aee039e8be3ab609d8873d93c81376b2a42cb6cb982c151d8f62a74fda21f05ca
-
SSDEEP
393216:atozVQn2/7rbz2k+TLa1xPm/nVnMlA6SGbpK1eYG1NtW2vT:atq/32TLa1xPm/VMG3GNoepR7
Static task
static1
Behavioral task
behavioral1
Sample
65aa8c4e3e86038466da82c4ee61ef20_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
65aa8c4e3e86038466da82c4ee61ef20_JaffaCakes118.apk
Resource
android-x64-20240514-en
Malware Config
Targets
-
-
Target
65aa8c4e3e86038466da82c4ee61ef20_JaffaCakes118
-
Size
18.8MB
-
MD5
65aa8c4e3e86038466da82c4ee61ef20
-
SHA1
06abfef7bfb587fc37a06b58a1fa8ab2448c0b6c
-
SHA256
6e8ffb457c755929741a683783401c1a57d1b67f7a53c94fb60cb1b4b85340b1
-
SHA512
ed27177f6f2dbcb94394c8b8f6c74c10049b5c973658c2cba3f96491488b156aee039e8be3ab609d8873d93c81376b2a42cb6cb982c151d8f62a74fda21f05ca
-
SSDEEP
393216:atozVQn2/7rbz2k+TLa1xPm/nVnMlA6SGbpK1eYG1NtW2vT:atq/32TLa1xPm/VMG3GNoepR7
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Acquires the wake lock
-
Checks if the internet connection is available
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-