General
-
Target
683947c3dce978c0d2ddbfcaad9733f2_JaffaCakes118
-
Size
16.4MB
-
Sample
240522-w9awracc86
-
MD5
683947c3dce978c0d2ddbfcaad9733f2
-
SHA1
37bcc89630d9cf257e3fe8a3d7ae1ef6e1c3a4d1
-
SHA256
5c2e5c3e6a4184ade5b8584b922e4a5eb09ce6b7b49643d2db4c4c08b92ab65c
-
SHA512
47b12935379f922fcd2fc916bd71289b4cd782d58a5ce90ff139e3b45548d76651808719039abddd5bef1cf07ececa66ce3b959aec3aba1a75cb321257975b2c
-
SSDEEP
393216:iEyenlRUFRidqxjqrMb8dkDhIo1sj1F6SR9o:RTQRmqxT8y7kLo
Behavioral task
behavioral1
Sample
683947c3dce978c0d2ddbfcaad9733f2_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
683947c3dce978c0d2ddbfcaad9733f2_JaffaCakes118
-
Size
16.4MB
-
MD5
683947c3dce978c0d2ddbfcaad9733f2
-
SHA1
37bcc89630d9cf257e3fe8a3d7ae1ef6e1c3a4d1
-
SHA256
5c2e5c3e6a4184ade5b8584b922e4a5eb09ce6b7b49643d2db4c4c08b92ab65c
-
SHA512
47b12935379f922fcd2fc916bd71289b4cd782d58a5ce90ff139e3b45548d76651808719039abddd5bef1cf07ececa66ce3b959aec3aba1a75cb321257975b2c
-
SSDEEP
393216:iEyenlRUFRidqxjqrMb8dkDhIo1sj1F6SR9o:RTQRmqxT8y7kLo
Score8/10-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Acquires the wake lock
-
Checks if the internet connection is available
-
Reads information about phone network operator.
-