General
-
Target
6c7293016701f9a5b735efa450ab51e6_JaffaCakes118
-
Size
7.2MB
-
Sample
240523-2aezbabb46
-
MD5
6c7293016701f9a5b735efa450ab51e6
-
SHA1
461c4518931e7c0e9ce840061c7fe417f16a92dc
-
SHA256
5420ce1f1221bca67dfb6ca316f14f57ebb5e7b3d0ea58bd96a37075fe33ed7f
-
SHA512
98aa32b4ff8dfaf617f3d005b28aa404078a03ec3e02fe3f683787792cbdaefba904ef93cb66ecc5259934dab84cc6036e5853d517aa2e33c945a8169baf306e
-
SSDEEP
196608:4ET6bFC5Oc096mhmb/YfxNyjN/O7EfraaP0aMYNDZlZrNkF1adCcn:1TEQ529jKok/AEfrUa3lTkraocn
Static task
static1
Behavioral task
behavioral1
Sample
6c7293016701f9a5b735efa450ab51e6_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
6c7293016701f9a5b735efa450ab51e6_JaffaCakes118
-
Size
7.2MB
-
MD5
6c7293016701f9a5b735efa450ab51e6
-
SHA1
461c4518931e7c0e9ce840061c7fe417f16a92dc
-
SHA256
5420ce1f1221bca67dfb6ca316f14f57ebb5e7b3d0ea58bd96a37075fe33ed7f
-
SHA512
98aa32b4ff8dfaf617f3d005b28aa404078a03ec3e02fe3f683787792cbdaefba904ef93cb66ecc5259934dab84cc6036e5853d517aa2e33c945a8169baf306e
-
SSDEEP
196608:4ET6bFC5Oc096mhmb/YfxNyjN/O7EfraaP0aMYNDZlZrNkF1adCcn:1TEQ529jKok/AEfrUa3lTkraocn
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Acquires the wake lock
-
Checks if the internet connection is available
-
Reads information about phone network operator.
-