General
-
Target
684b0b4b4ae8030b4827ca307ac4c891_JaffaCakes118
-
Size
3.6MB
-
Sample
240522-xqk32sda86
-
MD5
684b0b4b4ae8030b4827ca307ac4c891
-
SHA1
d4349906e195961ab45b88e489b829751fc3ce90
-
SHA256
eeb1e7b22141e44b531014e8fcbd9509439ccff643b220611c80f4aabd57d495
-
SHA512
cae9df34b89ed83e54e17ade5ec293f8a5971d956473a1136feabea0ffb4408f833cbcfbc3f931fd4fdb06f507c555a3e8d9aa27550793f6f0d1d665c2d83111
-
SSDEEP
98304:ihJ5Yk12SJmF3cAedfvbEhjvX5AMNvDbiVcxXUu84:i7MSEF3c1bEhjDNvDWetv84
Static task
static1
Behavioral task
behavioral1
Sample
684b0b4b4ae8030b4827ca307ac4c891_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
684b0b4b4ae8030b4827ca307ac4c891_JaffaCakes118
-
Size
3.6MB
-
MD5
684b0b4b4ae8030b4827ca307ac4c891
-
SHA1
d4349906e195961ab45b88e489b829751fc3ce90
-
SHA256
eeb1e7b22141e44b531014e8fcbd9509439ccff643b220611c80f4aabd57d495
-
SHA512
cae9df34b89ed83e54e17ade5ec293f8a5971d956473a1136feabea0ffb4408f833cbcfbc3f931fd4fdb06f507c555a3e8d9aa27550793f6f0d1d665c2d83111
-
SSDEEP
98304:ihJ5Yk12SJmF3cAedfvbEhjvX5AMNvDbiVcxXUu84:i7MSEF3c1bEhjDNvDWetv84
Score8/10-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-