General
-
Target
65addc1cf216fe13d5c1c0038fdd8699_JaffaCakes118
-
Size
30.4MB
-
Sample
240522-cv66vshd26
-
MD5
65addc1cf216fe13d5c1c0038fdd8699
-
SHA1
85ff84219eba38c27358002468672207e60a17e5
-
SHA256
a1428d5d070690d4839aa1c9084a391098dcf38132db6e40b034705423e4fb9b
-
SHA512
aff7a9c1cbbfb16579a38e03eccbd688b4e53053dd57418fa36d1ec505f855b1bfbdc31307185765be2e3bf49cb1c2568e5771f59fa400155585e5aed37b76f7
-
SSDEEP
786432:cDmm6M+Ke3BT1O3s1PbwyYd2s7yeRjDWnNKFYL8HM:cDMrKeb1PbgP7NjDa8FY4HM
Static task
static1
Behavioral task
behavioral1
Sample
65addc1cf216fe13d5c1c0038fdd8699_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
65addc1cf216fe13d5c1c0038fdd8699_JaffaCakes118.apk
Resource
android-x64-20240514-en
Malware Config
Targets
-
-
Target
65addc1cf216fe13d5c1c0038fdd8699_JaffaCakes118
-
Size
30.4MB
-
MD5
65addc1cf216fe13d5c1c0038fdd8699
-
SHA1
85ff84219eba38c27358002468672207e60a17e5
-
SHA256
a1428d5d070690d4839aa1c9084a391098dcf38132db6e40b034705423e4fb9b
-
SHA512
aff7a9c1cbbfb16579a38e03eccbd688b4e53053dd57418fa36d1ec505f855b1bfbdc31307185765be2e3bf49cb1c2568e5771f59fa400155585e5aed37b76f7
-
SSDEEP
786432:cDmm6M+Ke3BT1O3s1PbwyYd2s7yeRjDWnNKFYL8HM:cDMrKeb1PbgP7NjDa8FY4HM
Score7/10-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-