General
-
Target
692f0b74d1b32af24f14771af3bb43d6_JaffaCakes118
-
Size
2.0MB
-
Sample
240523-a3qgzafd34
-
MD5
692f0b74d1b32af24f14771af3bb43d6
-
SHA1
30c4e2237022adb32ce400c08678923c72b59fd7
-
SHA256
9839252678e14aaae4b2a6a9c73c03d20567c9064ea6c87128d83c90b3b8688d
-
SHA512
2418a423efe0ba218752bbe1243e0bfcaa77310e75d724a3549bfea94837bf9cc0f44137a9f145c0032d9eb8bd3fbc87fd46eb2d27e7e11f767203a5f6d8a635
-
SSDEEP
49152:QgY1VQ8tzgrdB5p2cIJNN00Nme8IdzyQfG3tdB6hFkWbuvWd+O:NY1VQ8tzedDp2cYN00NHyXdB6hFhqvpO
Static task
static1
Behavioral task
behavioral1
Sample
692f0b74d1b32af24f14771af3bb43d6_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
692f0b74d1b32af24f14771af3bb43d6_JaffaCakes118
-
Size
2.0MB
-
MD5
692f0b74d1b32af24f14771af3bb43d6
-
SHA1
30c4e2237022adb32ce400c08678923c72b59fd7
-
SHA256
9839252678e14aaae4b2a6a9c73c03d20567c9064ea6c87128d83c90b3b8688d
-
SHA512
2418a423efe0ba218752bbe1243e0bfcaa77310e75d724a3549bfea94837bf9cc0f44137a9f145c0032d9eb8bd3fbc87fd46eb2d27e7e11f767203a5f6d8a635
-
SSDEEP
49152:QgY1VQ8tzgrdB5p2cIJNN00Nme8IdzyQfG3tdB6hFkWbuvWd+O:NY1VQ8tzedDp2cYN00NHyXdB6hFhqvpO
Score7/10-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries the mobile country code (MCC)
-
Queries the phone number (MSISDN for GSM devices)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Queries the unique device ID (IMEI, MEID, IMSI)
-