General
-
Target
67d0ac9f6ffbdee556d50c0994bbec8b_JaffaCakes118
-
Size
2.8MB
-
Sample
240522-texqxsge41
-
MD5
67d0ac9f6ffbdee556d50c0994bbec8b
-
SHA1
0aeedf3dbd1d3b9bbf0227a784542387d831fcdb
-
SHA256
0a5e9af7c0176025227f0322994c584d9d6ea8ce860652bc0d3fafbcf6da169e
-
SHA512
e4abb1989864f6028620987632efb6675230407eb3121acb628be83fc933b76c5665f19681560f3fe3130245c95a10531bc406b4f81b25d5b7795723ecfedb41
-
SSDEEP
49152:soiJYkYiv0YtEtcMwqvFb/R27Nkc6R7Rau6hbLzt8Q8Lo9azQEnvLnBFVwfFcCSE:s3TYi8oJybJeNoau6d2Q8oGvrBFVwf6o
Static task
static1
Behavioral task
behavioral1
Sample
67d0ac9f6ffbdee556d50c0994bbec8b_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
67d0ac9f6ffbdee556d50c0994bbec8b_JaffaCakes118.apk
Resource
android-x64-20240514-en
Malware Config
Targets
-
-
Target
67d0ac9f6ffbdee556d50c0994bbec8b_JaffaCakes118
-
Size
2.8MB
-
MD5
67d0ac9f6ffbdee556d50c0994bbec8b
-
SHA1
0aeedf3dbd1d3b9bbf0227a784542387d831fcdb
-
SHA256
0a5e9af7c0176025227f0322994c584d9d6ea8ce860652bc0d3fafbcf6da169e
-
SHA512
e4abb1989864f6028620987632efb6675230407eb3121acb628be83fc933b76c5665f19681560f3fe3130245c95a10531bc406b4f81b25d5b7795723ecfedb41
-
SSDEEP
49152:soiJYkYiv0YtEtcMwqvFb/R27Nkc6R7Rau6hbLzt8Q8Lo9azQEnvLnBFVwfFcCSE:s3TYi8oJybJeNoau6d2Q8oGvrBFVwf6o
Score8/10-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Queries the unique device ID (IMEI, MEID, IMSI)
-