General
-
Target
66ce89a1886bca71e5aa5bb6a74ab459_JaffaCakes118
-
Size
29.9MB
-
Sample
240522-lh4dwaag91
-
MD5
66ce89a1886bca71e5aa5bb6a74ab459
-
SHA1
0037521d070b95a1736bf521436597119c391282
-
SHA256
cfad957a90fc93cecd4f9471f6c20abafabe7df6c7f6d3930c10d4483f605339
-
SHA512
2d7f45697ecc227471e1eac4f3c97fe1b200b9acc0be8fd164a1758ffca2ac81b4651432895feded3254177327f38c67aad3d58c2a7c6bba0bda17f4cb6ba182
-
SSDEEP
786432:Egu7+NXmcFbfwxE79CV1/Myqz3HwYNrUayPLhT4g7Y884LBX2:6O2cJ9uEyyQYFoPLhL7Y8f2
Static task
static1
Behavioral task
behavioral1
Sample
66ce89a1886bca71e5aa5bb6a74ab459_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
66ce89a1886bca71e5aa5bb6a74ab459_JaffaCakes118.apk
Resource
android-x64-20240514-en
Malware Config
Targets
-
-
Target
66ce89a1886bca71e5aa5bb6a74ab459_JaffaCakes118
-
Size
29.9MB
-
MD5
66ce89a1886bca71e5aa5bb6a74ab459
-
SHA1
0037521d070b95a1736bf521436597119c391282
-
SHA256
cfad957a90fc93cecd4f9471f6c20abafabe7df6c7f6d3930c10d4483f605339
-
SHA512
2d7f45697ecc227471e1eac4f3c97fe1b200b9acc0be8fd164a1758ffca2ac81b4651432895feded3254177327f38c67aad3d58c2a7c6bba0bda17f4cb6ba182
-
SSDEEP
786432:Egu7+NXmcFbfwxE79CV1/Myqz3HwYNrUayPLhT4g7Y884LBX2:6O2cJ9uEyyQYFoPLhL7Y8f2
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-