General
-
Target
68540843979bfc1cdad23957d1b54cff_JaffaCakes118
-
Size
10.7MB
-
Sample
240522-xzfvpadd69
-
MD5
68540843979bfc1cdad23957d1b54cff
-
SHA1
6e9430d3920423a90d9ef560ef7f57a39ea9ce54
-
SHA256
28631b5c7e1f701e15adfdd23c029023af681d8ad7f663846f83f4391a2b0243
-
SHA512
8f715de81547dde9bbf1ce71bd346ce2f5d1b22b9c9fa48a883860d31d4c2202fe872b580dc152a7672aee1cab068b8e19b8190ad9a06fd2a7b9db79249f3994
-
SSDEEP
196608:7XjoMqwCxKEbA7tpDfvVbDSrtgZQpmP/KQNwDnEzjm48UL366XUPvh:7XjoMHCxKy2ztSrtgZ1P/P+nmV8ULVXe
Static task
static1
Behavioral task
behavioral1
Sample
68540843979bfc1cdad23957d1b54cff_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
68540843979bfc1cdad23957d1b54cff_JaffaCakes118.apk
Resource
android-x64-20240514-en
Malware Config
Targets
-
-
Target
68540843979bfc1cdad23957d1b54cff_JaffaCakes118
-
Size
10.7MB
-
MD5
68540843979bfc1cdad23957d1b54cff
-
SHA1
6e9430d3920423a90d9ef560ef7f57a39ea9ce54
-
SHA256
28631b5c7e1f701e15adfdd23c029023af681d8ad7f663846f83f4391a2b0243
-
SHA512
8f715de81547dde9bbf1ce71bd346ce2f5d1b22b9c9fa48a883860d31d4c2202fe872b580dc152a7672aee1cab068b8e19b8190ad9a06fd2a7b9db79249f3994
-
SSDEEP
196608:7XjoMqwCxKEbA7tpDfvVbDSrtgZQpmP/KQNwDnEzjm48UL366XUPvh:7XjoMHCxKy2ztSrtgZ1P/P+nmV8ULVXe
Score7/10-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-