General
-
Target
670b83382bb50c60c1474cffa1b4b87e_JaffaCakes118
-
Size
10.5MB
-
Sample
240522-m7c4nace77
-
MD5
670b83382bb50c60c1474cffa1b4b87e
-
SHA1
81f5ffe1c677af694854e7679175cc830476ed89
-
SHA256
5afa8b44d4b7e945fd25cd587f32e82eda7e8879e2dabaa2f271c6f8399fd4b1
-
SHA512
94f693fe3e3efb1a8cfa0cec6c9ae2b751b8586877a7339ed811fd9f3e0530bf86e6d5aeada91c149a9a5469c19ca13e8ad4dab4ea4e5d2cd24129c1ead50b49
-
SSDEEP
196608:3QpZKlUBMDNzn5CD3VvdMiKO4FEx6ssJYTGBdCzC9oIWtRti/q/rq:+BeNb23F+iH4DtJEGEXNi/q/rq
Static task
static1
Behavioral task
behavioral1
Sample
670b83382bb50c60c1474cffa1b4b87e_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
670b83382bb50c60c1474cffa1b4b87e_JaffaCakes118
-
Size
10.5MB
-
MD5
670b83382bb50c60c1474cffa1b4b87e
-
SHA1
81f5ffe1c677af694854e7679175cc830476ed89
-
SHA256
5afa8b44d4b7e945fd25cd587f32e82eda7e8879e2dabaa2f271c6f8399fd4b1
-
SHA512
94f693fe3e3efb1a8cfa0cec6c9ae2b751b8586877a7339ed811fd9f3e0530bf86e6d5aeada91c149a9a5469c19ca13e8ad4dab4ea4e5d2cd24129c1ead50b49
-
SSDEEP
196608:3QpZKlUBMDNzn5CD3VvdMiKO4FEx6ssJYTGBdCzC9oIWtRti/q/rq:+BeNb23F+iH4DtJEGEXNi/q/rq
Score8/10-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries information about the current nearby Wi-Fi networks
Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Listens for changes in the sensor environment (might be used to detect emulation)
-