General
-
Target
681d4687e56ea2a3d346ecbf3e8c4d73_JaffaCakes118
-
Size
13.8MB
-
Sample
240522-wjxb3abb39
-
MD5
681d4687e56ea2a3d346ecbf3e8c4d73
-
SHA1
d4b5d5082f042d23395a09ce444830a3270bf55e
-
SHA256
debece435e0663ad6a22e702c1937c3a22c9847287fc504eeb5f7d34af3eb94d
-
SHA512
ae6ca1135ea828f521f9e7330b52a0878b66d02cd31b3f6ffd8bacf3c915fdce2728973d79a613cd505a2e4c17f52db3abccc2451d81309424d222d8166ab491
-
SSDEEP
393216:QCKxkAVg53n4GsVFp4nfB2Vy0l8qU6socu:gVg53xsLpqE7l8Zrxu
Static task
static1
Behavioral task
behavioral1
Sample
681d4687e56ea2a3d346ecbf3e8c4d73_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
681d4687e56ea2a3d346ecbf3e8c4d73_JaffaCakes118
-
Size
13.8MB
-
MD5
681d4687e56ea2a3d346ecbf3e8c4d73
-
SHA1
d4b5d5082f042d23395a09ce444830a3270bf55e
-
SHA256
debece435e0663ad6a22e702c1937c3a22c9847287fc504eeb5f7d34af3eb94d
-
SHA512
ae6ca1135ea828f521f9e7330b52a0878b66d02cd31b3f6ffd8bacf3c915fdce2728973d79a613cd505a2e4c17f52db3abccc2451d81309424d222d8166ab491
-
SSDEEP
393216:QCKxkAVg53n4GsVFp4nfB2Vy0l8qU6socu:gVg53xsLpqE7l8Zrxu
Score8/10-
Checks if the Android device is rooted.
-
Checks Android system properties for emulator presence.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Reads information about phone network operator.
-