General
-
Target
65db3f20dc989132d6c3744df1abec15_JaffaCakes118
-
Size
11.2MB
-
Sample
240522-d11rpsaf73
-
MD5
65db3f20dc989132d6c3744df1abec15
-
SHA1
0c784f147e6ea392a7f7ad75108f59de61031f3e
-
SHA256
e62720819c116637e0b8db17965306e9e2b81e32b4cbcf85f74b5dccaaa457fd
-
SHA512
0b844b4fc09b73b850b4cc01d74f0ad4c135ed1482b14405dfcb05bd8af2ac263a2b59674cd307cf05cd3af5b9e28ddda05cba7621f04c01d89ac7e8ef58cf30
-
SSDEEP
196608:DKJMWtl49hk7tFDlC0f6BQ4Xj4sEiJJPc5rJ1x2HM/awDs5:OJMWteI9C9Q4XjrPc5l1QM/9Da
Static task
static1
Behavioral task
behavioral1
Sample
65db3f20dc989132d6c3744df1abec15_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
65db3f20dc989132d6c3744df1abec15_JaffaCakes118.apk
Resource
android-x64-20240514-en
Malware Config
Targets
-
-
Target
65db3f20dc989132d6c3744df1abec15_JaffaCakes118
-
Size
11.2MB
-
MD5
65db3f20dc989132d6c3744df1abec15
-
SHA1
0c784f147e6ea392a7f7ad75108f59de61031f3e
-
SHA256
e62720819c116637e0b8db17965306e9e2b81e32b4cbcf85f74b5dccaaa457fd
-
SHA512
0b844b4fc09b73b850b4cc01d74f0ad4c135ed1482b14405dfcb05bd8af2ac263a2b59674cd307cf05cd3af5b9e28ddda05cba7621f04c01d89ac7e8ef58cf30
-
SSDEEP
196608:DKJMWtl49hk7tFDlC0f6BQ4Xj4sEiJJPc5rJ1x2HM/awDs5:OJMWteI9C9Q4XjrPc5l1QM/9Da
Score8/10-
Checks if the Android device is rooted.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks the presence of a debugger
-