General
-
Target
67011e4d3d29a465b6f3ccddbdf440c7_JaffaCakes118
-
Size
12.9MB
-
Sample
240522-mw4ggacc9s
-
MD5
67011e4d3d29a465b6f3ccddbdf440c7
-
SHA1
1ce4eb32c75f862cff91870253dbc94f887cf621
-
SHA256
0c17c267e6af757129c5423da0c5aedb2ba54901820b14f546a82007ce5b3e5d
-
SHA512
9476d3fc08f9e4989508640ada257c84428246e41401194ba1de1c37cfb8de158707e9594b7621f720f36e2bf301f7024a5a5ea410ab399e0d518c567b7573ea
-
SSDEEP
196608:Gh5N1+xks5SHl/ilRwb1pRXKIVmLFdMLW4UnxNfF2+kQQ+bwPZC6Iqi12BCWyDRO:Vv58H1KIVmLFeVF/QqPZnB0kPahe1
Static task
static1
Behavioral task
behavioral1
Sample
67011e4d3d29a465b6f3ccddbdf440c7_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
67011e4d3d29a465b6f3ccddbdf440c7_JaffaCakes118
-
Size
12.9MB
-
MD5
67011e4d3d29a465b6f3ccddbdf440c7
-
SHA1
1ce4eb32c75f862cff91870253dbc94f887cf621
-
SHA256
0c17c267e6af757129c5423da0c5aedb2ba54901820b14f546a82007ce5b3e5d
-
SHA512
9476d3fc08f9e4989508640ada257c84428246e41401194ba1de1c37cfb8de158707e9594b7621f720f36e2bf301f7024a5a5ea410ab399e0d518c567b7573ea
-
SSDEEP
196608:Gh5N1+xks5SHl/ilRwb1pRXKIVmLFdMLW4UnxNfF2+kQQ+bwPZC6Iqi12BCWyDRO:Vv58H1KIVmLFeVF/QqPZnB0kPahe1
Score7/10-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Acquires the wake lock
-
Checks if the internet connection is available
-
Reads information about phone network operator.
-