General
-
Target
67ead4181c09f74ac8fc37e0358ae4e8_JaffaCakes118
-
Size
11.5MB
-
Sample
240522-t7jprshd9y
-
MD5
67ead4181c09f74ac8fc37e0358ae4e8
-
SHA1
268492864fca8bc2905c243427e178a3ab91a7bb
-
SHA256
afe9befcd649f627198a4ae953334d794fcaa2d206fac35b457f90354a56655f
-
SHA512
25511e652b3c9cd4b08f6edfbbcc614f5a200e6ef67639d3db1dcd10b884d1005e4059839706039c4b913cfc1d7547d5c4fbfda5d65e2485c8900a7e802b2484
-
SSDEEP
196608:XniELeHD/rQHSYXAmkI9rqSJLSYEtdszh5u8CyMHb9bqAovWL3p29/AL3p29/8C4:XniE4/rQHfX/DxGtWzsyMHJbq5vWL30I
Static task
static1
Behavioral task
behavioral1
Sample
67ead4181c09f74ac8fc37e0358ae4e8_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
67ead4181c09f74ac8fc37e0358ae4e8_JaffaCakes118.apk
Resource
android-33-x64-arm64-20240514-en
Malware Config
Targets
-
-
Target
67ead4181c09f74ac8fc37e0358ae4e8_JaffaCakes118
-
Size
11.5MB
-
MD5
67ead4181c09f74ac8fc37e0358ae4e8
-
SHA1
268492864fca8bc2905c243427e178a3ab91a7bb
-
SHA256
afe9befcd649f627198a4ae953334d794fcaa2d206fac35b457f90354a56655f
-
SHA512
25511e652b3c9cd4b08f6edfbbcc614f5a200e6ef67639d3db1dcd10b884d1005e4059839706039c4b913cfc1d7547d5c4fbfda5d65e2485c8900a7e802b2484
-
SSDEEP
196608:XniELeHD/rQHSYXAmkI9rqSJLSYEtdszh5u8CyMHb9bqAovWL3p29/AL3p29/8C4:XniE4/rQHfX/DxGtWzsyMHJbq5vWL30I
Score8/10-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-