General
-
Target
6722af87b4174e30d71df3e3b43ca919_JaffaCakes118
-
Size
8.8MB
-
Sample
240522-ns76xsdc35
-
MD5
6722af87b4174e30d71df3e3b43ca919
-
SHA1
c770dc26eea9bc7fe9fa3e0eab50ca28ba859a6e
-
SHA256
5308b9735f2cb43aae54be98b8d942ddde286cf6c1a9e6d96459ba0326051f82
-
SHA512
f267759c3b4f303fae11693dcc9597d18504b048ece6f6992eaf083b624d24a2e3e5a58b925fef816e9f1caf59c48b237674473b4aa3fed53684423e6b9025d8
-
SSDEEP
196608:mfpWQmgh1fWkxfW41CnRYWkS7ukq2PJGjH0Oh/iPsgnQErvlfjkgFT:mZh1fWk9h1yYOPJGL0c/mlnQ8lh
Static task
static1
Behavioral task
behavioral1
Sample
6722af87b4174e30d71df3e3b43ca919_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
6722af87b4174e30d71df3e3b43ca919_JaffaCakes118.apk
Resource
android-x64-20240514-en
Malware Config
Targets
-
-
Target
6722af87b4174e30d71df3e3b43ca919_JaffaCakes118
-
Size
8.8MB
-
MD5
6722af87b4174e30d71df3e3b43ca919
-
SHA1
c770dc26eea9bc7fe9fa3e0eab50ca28ba859a6e
-
SHA256
5308b9735f2cb43aae54be98b8d942ddde286cf6c1a9e6d96459ba0326051f82
-
SHA512
f267759c3b4f303fae11693dcc9597d18504b048ece6f6992eaf083b624d24a2e3e5a58b925fef816e9f1caf59c48b237674473b4aa3fed53684423e6b9025d8
-
SSDEEP
196608:mfpWQmgh1fWkxfW41CnRYWkS7ukq2PJGjH0Oh/iPsgnQErvlfjkgFT:mZh1fWk9h1yYOPJGL0c/mlnQ8lh
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-