General
-
Target
666fdf3b2ed8961d2afe7383abe9c70e_JaffaCakes118
-
Size
4.8MB
-
Sample
240522-h2rbwaga7w
-
MD5
666fdf3b2ed8961d2afe7383abe9c70e
-
SHA1
14998548542d5ef37c8e98d68236ae9dff4290eb
-
SHA256
7d9f35f5769f420a61c9415dd2e6289c2ef11f6f8db302e0e18f9fdb89fc3014
-
SHA512
656c2b90bec2e4818b802faaae0fec3e850d91d787a16bcaccf81dcada513912267261b1fbca81e1953603fa470175b0e2d80df74179839c2c2cb3626a6c3d8a
-
SSDEEP
98304:lx7yHlER3JE8E2j+pVydaMwafNH8vzNyh3ReiHyAJRVU:lOJPGdSUd8QhB6AJRe
Static task
static1
Behavioral task
behavioral1
Sample
666fdf3b2ed8961d2afe7383abe9c70e_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
666fdf3b2ed8961d2afe7383abe9c70e_JaffaCakes118
-
Size
4.8MB
-
MD5
666fdf3b2ed8961d2afe7383abe9c70e
-
SHA1
14998548542d5ef37c8e98d68236ae9dff4290eb
-
SHA256
7d9f35f5769f420a61c9415dd2e6289c2ef11f6f8db302e0e18f9fdb89fc3014
-
SHA512
656c2b90bec2e4818b802faaae0fec3e850d91d787a16bcaccf81dcada513912267261b1fbca81e1953603fa470175b0e2d80df74179839c2c2cb3626a6c3d8a
-
SSDEEP
98304:lx7yHlER3JE8E2j+pVydaMwafNH8vzNyh3ReiHyAJRVU:lOJPGdSUd8QhB6AJRe
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the mobile country code (MCC)
-
Queries the phone number (MSISDN for GSM devices)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-