General
-
Target
67f2a774c857d13f7480abf7e1f6e74c_JaffaCakes118
-
Size
4.8MB
-
Sample
240522-ve19sahg3x
-
MD5
67f2a774c857d13f7480abf7e1f6e74c
-
SHA1
1755dcd246e34b417c3fdd9ec31b353a62b61b1a
-
SHA256
1f31fa819f7a182e880a7a7a29f25fb628bfd3d774d655d2a1b96cd5968a6f72
-
SHA512
6fc8ae5b347ff98f746cb9aff851de1b3f7e29de7b8efcc7a5195cc29cecf15d7994d90307a907612a927fd3a74291c5cff8d1392b28e3ab84da0e742e134d4b
-
SSDEEP
98304:OlXjWgwd0cA8PUXcRFLpuGCLydaMwafNHnvk6JQ:Owd5A8PWiFMPmdSUdFJQ
Static task
static1
Behavioral task
behavioral1
Sample
67f2a774c857d13f7480abf7e1f6e74c_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
67f2a774c857d13f7480abf7e1f6e74c_JaffaCakes118
-
Size
4.8MB
-
MD5
67f2a774c857d13f7480abf7e1f6e74c
-
SHA1
1755dcd246e34b417c3fdd9ec31b353a62b61b1a
-
SHA256
1f31fa819f7a182e880a7a7a29f25fb628bfd3d774d655d2a1b96cd5968a6f72
-
SHA512
6fc8ae5b347ff98f746cb9aff851de1b3f7e29de7b8efcc7a5195cc29cecf15d7994d90307a907612a927fd3a74291c5cff8d1392b28e3ab84da0e742e134d4b
-
SSDEEP
98304:OlXjWgwd0cA8PUXcRFLpuGCLydaMwafNHnvk6JQ:Owd5A8PWiFMPmdSUdFJQ
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the mobile country code (MCC)
-
Queries the phone number (MSISDN for GSM devices)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-