General
-
Target
681453b6a956bc0082ebf4f36c2bd36a_JaffaCakes118
-
Size
24.8MB
-
Sample
240522-wa1ccsag74
-
MD5
681453b6a956bc0082ebf4f36c2bd36a
-
SHA1
60e4239b7cfe549f1fc6e36a244fbc0be96597da
-
SHA256
9bad97ec8d9076932578b74a622b7d113b681ccbf7bc04279162766797e9e2fb
-
SHA512
6d926f8f5443ffd55002cd3dba86943a00dd9401c726db19b3ff7430d75ba19ec198aeadbf1aea7087368ce28b63b9b36491c469f62aef50ceba0c0690b06545
-
SSDEEP
786432:9utoc5pa1DL5tizgAMuExYex3jetEyowDF:9dcsDGPU7xyfr5
Static task
static1
Behavioral task
behavioral1
Sample
681453b6a956bc0082ebf4f36c2bd36a_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
681453b6a956bc0082ebf4f36c2bd36a_JaffaCakes118.apk
Resource
android-x64-arm64-20240514-en
Malware Config
Targets
-
-
Target
681453b6a956bc0082ebf4f36c2bd36a_JaffaCakes118
-
Size
24.8MB
-
MD5
681453b6a956bc0082ebf4f36c2bd36a
-
SHA1
60e4239b7cfe549f1fc6e36a244fbc0be96597da
-
SHA256
9bad97ec8d9076932578b74a622b7d113b681ccbf7bc04279162766797e9e2fb
-
SHA512
6d926f8f5443ffd55002cd3dba86943a00dd9401c726db19b3ff7430d75ba19ec198aeadbf1aea7087368ce28b63b9b36491c469f62aef50ceba0c0690b06545
-
SSDEEP
786432:9utoc5pa1DL5tizgAMuExYex3jetEyowDF:9dcsDGPU7xyfr5
-
Checks if the Android device is rooted.
-
Checks Android system properties for emulator presence.
-
Queries account information for other applications stored on the device
Application may abuse the framework's APIs to collect account information stored on the device.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Reads information about phone network operator.
-
Checks the presence of a debugger
-