General
-
Target
67eb985859a554a190759810e65ee88c_JaffaCakes118
-
Size
5.5MB
-
Sample
240522-t77ftshe3s
-
MD5
67eb985859a554a190759810e65ee88c
-
SHA1
15682ee0501b6bc63ffa9d2a9aa419ddde7d7b91
-
SHA256
a4a0804c14658743ddfa1bb1467cc3abd97b008764ef3e8114e99b4b97e3066b
-
SHA512
9f1158265d2bf9c437cafb54d43e328788ac95b73d50267cf920a79c4c0def684bcf111a4b7a3883a2bfcc7e7840fb7885c6d2bf21cb9d79c5b7960dc2c86bd8
-
SSDEEP
98304:ecEFTxe1kDQcHNl+FKG066mZtkHXYX96icSUboW9x3oXcvCRXwj4vvFh2BI9TSNp:ecKelcHP+DZWYXcWWf4XcqZHvvv2PNh/
Static task
static1
Behavioral task
behavioral1
Sample
67eb985859a554a190759810e65ee88c_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
sdk.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral3
Sample
sdk.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral4
Sample
sdk.apk
Resource
android-x64-arm64-20240514-en
Malware Config
Targets
-
-
Target
67eb985859a554a190759810e65ee88c_JaffaCakes118
-
Size
5.5MB
-
MD5
67eb985859a554a190759810e65ee88c
-
SHA1
15682ee0501b6bc63ffa9d2a9aa419ddde7d7b91
-
SHA256
a4a0804c14658743ddfa1bb1467cc3abd97b008764ef3e8114e99b4b97e3066b
-
SHA512
9f1158265d2bf9c437cafb54d43e328788ac95b73d50267cf920a79c4c0def684bcf111a4b7a3883a2bfcc7e7840fb7885c6d2bf21cb9d79c5b7960dc2c86bd8
-
SSDEEP
98304:ecEFTxe1kDQcHNl+FKG066mZtkHXYX96icSUboW9x3oXcvCRXwj4vvFh2BI9TSNp:ecKelcHP+DZWYXcWWf4XcqZHvvv2PNh/
-
Checks if the Android device is rooted.
-
Checks known Qemu files.
Checks for known Qemu files that exist on Android virtual device images.
-
Checks known Qemu pipes.
Checks for known pipes used by the Android emulator to communicate with the host.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Reads information about phone network operator.
-
Schedules tasks to execute at a specified time
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
-
-
-
Target
sdk.jar
-
Size
158KB
-
MD5
d440d29973a4652bd33f145221ad6aec
-
SHA1
a6883bfa17a19d266b67de42c243de503d5be2f5
-
SHA256
61a9767c427e8b2eea2421ee1f3541aa6735302d549b2eda02ab718994f70bcb
-
SHA512
9fbfbbadc9ab71c38d001a1c3db081a7f3d2568d650409c9daa8f626ea45a66f1d02fe0f52e8edcf430a79ba4e49f3102d91c6dfbbf599449edc958734325645
-
SSDEEP
3072:wgbYL1U5ewMbpPsPVcocB4Q1XLKbPgv1x8cLrBKtzdefKLk0AJ1:wg8LCeDbpPstcocSNPWxrQje0k1
Score1/10 -