General
-
Target
66bfabbe80f4ab5bb4f8da130924b822_JaffaCakes118
-
Size
5.8MB
-
Sample
240522-k4bejsab75
-
MD5
66bfabbe80f4ab5bb4f8da130924b822
-
SHA1
645c3d9dad76ea8a3862ce2feaebc8dec191bac4
-
SHA256
8507a157b668ea7084c0a5611aee4f76d4add9a6c87670510c20de4e8c53f312
-
SHA512
ae850fb81ff5e55ace14145b66cc6309f143059d8f4964eef9c3ac5345e1de17141f3bc24e422a7ea86898b60220afb8126d0699d744e8d4385e2486be2e81cd
-
SSDEEP
49152:bq/4L6pi4ylAHa0rr9JZ5Bx3e3x/pCX7XtZsuSaLuPHRa/A/D+dap:b8dBxO3futZLSaLUR+Ab++
Static task
static1
Behavioral task
behavioral1
Sample
66bfabbe80f4ab5bb4f8da130924b822_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
66bfabbe80f4ab5bb4f8da130924b822_JaffaCakes118.apk
Resource
android-x64-20240514-en
Malware Config
Targets
-
-
Target
66bfabbe80f4ab5bb4f8da130924b822_JaffaCakes118
-
Size
5.8MB
-
MD5
66bfabbe80f4ab5bb4f8da130924b822
-
SHA1
645c3d9dad76ea8a3862ce2feaebc8dec191bac4
-
SHA256
8507a157b668ea7084c0a5611aee4f76d4add9a6c87670510c20de4e8c53f312
-
SHA512
ae850fb81ff5e55ace14145b66cc6309f143059d8f4964eef9c3ac5345e1de17141f3bc24e422a7ea86898b60220afb8126d0699d744e8d4385e2486be2e81cd
-
SSDEEP
49152:bq/4L6pi4ylAHa0rr9JZ5Bx3e3x/pCX7XtZsuSaLuPHRa/A/D+dap:b8dBxO3futZLSaLUR+Ab++
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-