General
-
Target
669384b5225de10a147f7359f6b7db6a_JaffaCakes118
-
Size
30.1MB
-
Sample
240522-jy3q6shb81
-
MD5
669384b5225de10a147f7359f6b7db6a
-
SHA1
7affb50ec4c8fb5928288d6fba1292319e86285c
-
SHA256
c3060b02ad554a5a8da41b46dc446b054c470e29c1caa0a7060a1ab8e4f36a90
-
SHA512
70899cbcaef49deb3106cddda14f2662b9f9a98235ffa0317baaf16cf3d7a49031cc9e705c067dd3507889d13972531cf8f43faf787f7d38813658617b0b26d0
-
SSDEEP
393216:8h9jR/sY5BRGBUmemqjs9Bs9gynSbiKWjzX3NVUFmjyYIFYwNttx4EokiNokiyzr:5GBRGHDKjnSbXWT0F1Ntlo7o28Lg
Static task
static1
Behavioral task
behavioral1
Sample
669384b5225de10a147f7359f6b7db6a_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
669384b5225de10a147f7359f6b7db6a_JaffaCakes118
-
Size
30.1MB
-
MD5
669384b5225de10a147f7359f6b7db6a
-
SHA1
7affb50ec4c8fb5928288d6fba1292319e86285c
-
SHA256
c3060b02ad554a5a8da41b46dc446b054c470e29c1caa0a7060a1ab8e4f36a90
-
SHA512
70899cbcaef49deb3106cddda14f2662b9f9a98235ffa0317baaf16cf3d7a49031cc9e705c067dd3507889d13972531cf8f43faf787f7d38813658617b0b26d0
-
SSDEEP
393216:8h9jR/sY5BRGBUmemqjs9Bs9gynSbiKWjzX3NVUFmjyYIFYwNttx4EokiNokiyzr:5GBRGHDKjnSbXWT0F1Ntlo7o28Lg
-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the phone number (MSISDN for GSM devices)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Reads information about phone network operator.
-