General
-
Target
689b9b3a2f3266ab6f7b340c1a19c736_JaffaCakes118
-
Size
15.1MB
-
Sample
240522-zrt4fsgd2s
-
MD5
689b9b3a2f3266ab6f7b340c1a19c736
-
SHA1
b8abdbb17736bd7051320a8328e747a02be2b8bb
-
SHA256
1e4d4c511c5a04b41a5e7c50e92041037a7a03f883b60ff426e210525bcdc3b4
-
SHA512
fd0739dcfdf65630da9b4fb62d8e20015d083b1269303752df8e09348fe9886bf9718a9fbc68e276c23cb9f0e346e1b45db6e1239835aaaed30b52d7132d0eb3
-
SSDEEP
393216:HijiAnaIIUHbowx660CmlLcwVOpM3RQbtL9VsFZrgjzuN9YUUrh:W/naIlHMPHChJR9QrgjzuN9YUg
Static task
static1
Behavioral task
behavioral1
Sample
689b9b3a2f3266ab6f7b340c1a19c736_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
689b9b3a2f3266ab6f7b340c1a19c736_JaffaCakes118.apk
Resource
android-33-x64-arm64-20240514-en
Malware Config
Targets
-
-
Target
689b9b3a2f3266ab6f7b340c1a19c736_JaffaCakes118
-
Size
15.1MB
-
MD5
689b9b3a2f3266ab6f7b340c1a19c736
-
SHA1
b8abdbb17736bd7051320a8328e747a02be2b8bb
-
SHA256
1e4d4c511c5a04b41a5e7c50e92041037a7a03f883b60ff426e210525bcdc3b4
-
SHA512
fd0739dcfdf65630da9b4fb62d8e20015d083b1269303752df8e09348fe9886bf9718a9fbc68e276c23cb9f0e346e1b45db6e1239835aaaed30b52d7132d0eb3
-
SSDEEP
393216:HijiAnaIIUHbowx660CmlLcwVOpM3RQbtL9VsFZrgjzuN9YUUrh:W/naIlHMPHChJR9QrgjzuN9YUg
Score8/10-
Checks if the Android device is rooted.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks the presence of a debugger
-