General
-
Target
684b602f16f1f240db5850779cff9549_JaffaCakes118
-
Size
30.3MB
-
Sample
240522-xqs4nada96
-
MD5
684b602f16f1f240db5850779cff9549
-
SHA1
0e5ec14912c5aeadc4c9a1b808aefd28598bf866
-
SHA256
13df86d8fb6afba1492be0ba67e087c87e2bffcf4f6f085af3a68410d7a43a11
-
SHA512
710eddb0a9ece26f64007d8507fc8ea67892c678588cbc07b535ba99a33f11fc94ab7b37c1d9c60aeb8f2f9c2c17abef65f477636d8435aecad650dd4bb24d8e
-
SSDEEP
786432:ZscI1jIC7H2kMh2SZezZP0/sE4UzUZOQ5YKIQP4K4O:M1kC7H2LbeFP0/shmUZL5Yjo
Static task
static1
Behavioral task
behavioral1
Sample
684b602f16f1f240db5850779cff9549_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
684b602f16f1f240db5850779cff9549_JaffaCakes118
-
Size
30.3MB
-
MD5
684b602f16f1f240db5850779cff9549
-
SHA1
0e5ec14912c5aeadc4c9a1b808aefd28598bf866
-
SHA256
13df86d8fb6afba1492be0ba67e087c87e2bffcf4f6f085af3a68410d7a43a11
-
SHA512
710eddb0a9ece26f64007d8507fc8ea67892c678588cbc07b535ba99a33f11fc94ab7b37c1d9c60aeb8f2f9c2c17abef65f477636d8435aecad650dd4bb24d8e
-
SSDEEP
786432:ZscI1jIC7H2kMh2SZezZP0/sE4UzUZOQ5YKIQP4K4O:M1kC7H2LbeFP0/shmUZL5Yjo
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Reads information about phone network operator.
-
Schedules tasks to execute at a specified time
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
-