General
-
Target
6864b12ccf68093159ff1e9d771bc716_JaffaCakes118
-
Size
6.5MB
-
Sample
240522-yff7saeb75
-
MD5
6864b12ccf68093159ff1e9d771bc716
-
SHA1
be6dc2ef5814df66151245a3004f77d7430a4b9d
-
SHA256
cb81a06c056a438ccf9ceb4a3db5e8e2d43c96e01d5ad5290c2552d896c3f0bb
-
SHA512
6203866e5c822d271cf3565ee5fcf68460ca736568d994483ad45b63d6da551ac57d291bee2a9051ab13eddde96416d12f04eafa675750f2183f46b2a25797e3
-
SSDEEP
196608:s/zcWNvDF+ulf8v0KZQEnyJg6uyHcuw7H2WM:SND+ZygdyI7HJM
Static task
static1
Behavioral task
behavioral1
Sample
6864b12ccf68093159ff1e9d771bc716_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
6864b12ccf68093159ff1e9d771bc716_JaffaCakes118.apk
Resource
android-x64-20240514-en
Malware Config
Targets
-
-
Target
6864b12ccf68093159ff1e9d771bc716_JaffaCakes118
-
Size
6.5MB
-
MD5
6864b12ccf68093159ff1e9d771bc716
-
SHA1
be6dc2ef5814df66151245a3004f77d7430a4b9d
-
SHA256
cb81a06c056a438ccf9ceb4a3db5e8e2d43c96e01d5ad5290c2552d896c3f0bb
-
SHA512
6203866e5c822d271cf3565ee5fcf68460ca736568d994483ad45b63d6da551ac57d291bee2a9051ab13eddde96416d12f04eafa675750f2183f46b2a25797e3
-
SSDEEP
196608:s/zcWNvDF+ulf8v0KZQEnyJg6uyHcuw7H2WM:SND+ZygdyI7HJM
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Queries the unique device ID (IMEI, MEID, IMSI)
-