General
-
Target
686d516ca7c83f7ac63ad34fb23ea3ce_JaffaCakes118
-
Size
18.6MB
-
Sample
240522-ynry9aee29
-
MD5
686d516ca7c83f7ac63ad34fb23ea3ce
-
SHA1
9a9bc044984cb5e073357b9e8dc2445b1b746e1f
-
SHA256
9438c23264974cf6492f855a20f02e0d09576680b3e1e519cac7993ac266e1bf
-
SHA512
6d4c7882d480962a41e75b1d2f3bcbbb10296ea05128d2475e9fb4d0004fc6df29c876bb74013428ca09e96b27ff8d738066affef2d6c2faa5d7f95481d64bbb
-
SSDEEP
393216:lvCPIgbOlz0ZbYAYek9G6kQjPwhmeZQYfSjVib6wghSC:1Bgy9Jr9Gs3JJY6wghV
Static task
static1
Behavioral task
behavioral1
Sample
686d516ca7c83f7ac63ad34fb23ea3ce_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
686d516ca7c83f7ac63ad34fb23ea3ce_JaffaCakes118
-
Size
18.6MB
-
MD5
686d516ca7c83f7ac63ad34fb23ea3ce
-
SHA1
9a9bc044984cb5e073357b9e8dc2445b1b746e1f
-
SHA256
9438c23264974cf6492f855a20f02e0d09576680b3e1e519cac7993ac266e1bf
-
SHA512
6d4c7882d480962a41e75b1d2f3bcbbb10296ea05128d2475e9fb4d0004fc6df29c876bb74013428ca09e96b27ff8d738066affef2d6c2faa5d7f95481d64bbb
-
SSDEEP
393216:lvCPIgbOlz0ZbYAYek9G6kQjPwhmeZQYfSjVib6wghSC:1Bgy9Jr9Gs3JJY6wghV
Score7/10-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Reads information about phone network operator.
-