General
-
Target
6716404f81bfc9e50f9d579d62b38ae1_JaffaCakes118
-
Size
3.3MB
-
Sample
240522-ng4dlacg93
-
MD5
6716404f81bfc9e50f9d579d62b38ae1
-
SHA1
b4fbaeb9b7199a2fe3a11688fc0f581a83d10726
-
SHA256
d9f97fc57b493accaadefbb05f109f0702f448874a8c92402b340d9ea1685411
-
SHA512
eb90eec9cffc6b5b3a6f3f3890f870861b4fdddc94a215a6fd763d5673dfa84e6c51527b12a6d64892dc342d715fad8d1f4b0f14ea3fcfa954a6eae69e9c1346
-
SSDEEP
98304:fPrL/jD6ZNvBoknQqBDCirqDMaepvb3LHOtywXj3kYK1pGL:fDDSZNKkBQe5y
Static task
static1
Behavioral task
behavioral1
Sample
6716404f81bfc9e50f9d579d62b38ae1_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
6716404f81bfc9e50f9d579d62b38ae1_JaffaCakes118.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral3
Sample
6716404f81bfc9e50f9d579d62b38ae1_JaffaCakes118.apk
Resource
android-x64-arm64-20240514-en
Malware Config
Targets
-
-
Target
6716404f81bfc9e50f9d579d62b38ae1_JaffaCakes118
-
Size
3.3MB
-
MD5
6716404f81bfc9e50f9d579d62b38ae1
-
SHA1
b4fbaeb9b7199a2fe3a11688fc0f581a83d10726
-
SHA256
d9f97fc57b493accaadefbb05f109f0702f448874a8c92402b340d9ea1685411
-
SHA512
eb90eec9cffc6b5b3a6f3f3890f870861b4fdddc94a215a6fd763d5673dfa84e6c51527b12a6d64892dc342d715fad8d1f4b0f14ea3fcfa954a6eae69e9c1346
-
SSDEEP
98304:fPrL/jD6ZNvBoknQqBDCirqDMaepvb3LHOtywXj3kYK1pGL:fDDSZNKkBQe5y
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-
Schedules tasks to execute at a specified time
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
-