General
-
Target
666f50b3dd75cd8dcb483e84456b0504_JaffaCakes118
-
Size
20.0MB
-
Sample
240522-h1y1bsga51
-
MD5
666f50b3dd75cd8dcb483e84456b0504
-
SHA1
ad879e94d0eb619f1e54a9ee9a26ecf8372a491a
-
SHA256
400901c1acf1074d26701bf113d5d4258e0b36add8ea163eb3a1e24bd95c476c
-
SHA512
f7020d0fde3d0a1388505d8c6a7329358dd0542332fedcb3b80d02ae19cfbf34717812a1fcfec5ebc10c51f621b080c7ad2ea8e07ae41728bfcae3f1e4bcc258
-
SSDEEP
393216:wcciCVA+TInbacvrMlYF/x1Z/uO5gJCc4Z/Ns3o1:6je+Twb/vrMw/uYXZlsW
Static task
static1
Behavioral task
behavioral1
Sample
666f50b3dd75cd8dcb483e84456b0504_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
666f50b3dd75cd8dcb483e84456b0504_JaffaCakes118
-
Size
20.0MB
-
MD5
666f50b3dd75cd8dcb483e84456b0504
-
SHA1
ad879e94d0eb619f1e54a9ee9a26ecf8372a491a
-
SHA256
400901c1acf1074d26701bf113d5d4258e0b36add8ea163eb3a1e24bd95c476c
-
SHA512
f7020d0fde3d0a1388505d8c6a7329358dd0542332fedcb3b80d02ae19cfbf34717812a1fcfec5ebc10c51f621b080c7ad2ea8e07ae41728bfcae3f1e4bcc258
-
SSDEEP
393216:wcciCVA+TInbacvrMlYF/x1Z/uO5gJCc4Z/Ns3o1:6je+Twb/vrMw/uYXZlsW
Score7/10-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Reads information about phone network operator.
-