General
-
Target
66c6dec5beab22c764c33c909f98f047_JaffaCakes118
-
Size
13.8MB
-
Sample
240522-la8cvsaf3t
-
MD5
66c6dec5beab22c764c33c909f98f047
-
SHA1
e0c589176068b803e9ce29307173354d260968de
-
SHA256
838568de8e6d0a2b08ac5a97b913192d289bd5ee0d5b0bb882f45fe6491bc2d0
-
SHA512
14ab8250ae956ab1786e33db77c14f4c95e2f56c3d7e623e9e3d9bdaa931f03cb436029876c05323dd904d699134206ee991ffd3675f7fd9f3ecf1dd65051bfb
-
SSDEEP
393216:zfKyYcG3E0duS4Vn/IslMXHR8fGb9ddMldzj:zfClESSgslMXeMbOPzj
Static task
static1
Behavioral task
behavioral1
Sample
66c6dec5beab22c764c33c909f98f047_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
66c6dec5beab22c764c33c909f98f047_JaffaCakes118
-
Size
13.8MB
-
MD5
66c6dec5beab22c764c33c909f98f047
-
SHA1
e0c589176068b803e9ce29307173354d260968de
-
SHA256
838568de8e6d0a2b08ac5a97b913192d289bd5ee0d5b0bb882f45fe6491bc2d0
-
SHA512
14ab8250ae956ab1786e33db77c14f4c95e2f56c3d7e623e9e3d9bdaa931f03cb436029876c05323dd904d699134206ee991ffd3675f7fd9f3ecf1dd65051bfb
-
SSDEEP
393216:zfKyYcG3E0duS4Vn/IslMXHR8fGb9ddMldzj:zfClESSgslMXeMbOPzj
Score7/10-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-