General
-
Target
69587d5a2a638b1e4246a3023fab823b_JaffaCakes118
-
Size
20.5MB
-
Sample
240523-b9f3jshe55
-
MD5
69587d5a2a638b1e4246a3023fab823b
-
SHA1
8952a3d4f66c17f24d589350451cd91b15cf2659
-
SHA256
c5ffd3ce6714500166a4c18dae7f28b1b1b40323ca15b8fdc4eab3f9c8e2675a
-
SHA512
3bfc7e74586a6a276f282ae4486723e38e14d6d8f54e177e9c48143e140f58b4bbadc4afddeecf5a92c25ee314316bb3a3ba07cbc57fb773995e1ba296dc574d
-
SSDEEP
393216:IjhkcfRKDBBaxg7X7z08z8QmFv/LvMQcgSxMji+AOXoNuyK/oDP:Ijhky8B8+vZk4qUMPAOXoQyWk
Behavioral task
behavioral1
Sample
69587d5a2a638b1e4246a3023fab823b_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
69587d5a2a638b1e4246a3023fab823b_JaffaCakes118.apk
Resource
android-x64-20240514-en
Malware Config
Targets
-
-
Target
69587d5a2a638b1e4246a3023fab823b_JaffaCakes118
-
Size
20.5MB
-
MD5
69587d5a2a638b1e4246a3023fab823b
-
SHA1
8952a3d4f66c17f24d589350451cd91b15cf2659
-
SHA256
c5ffd3ce6714500166a4c18dae7f28b1b1b40323ca15b8fdc4eab3f9c8e2675a
-
SHA512
3bfc7e74586a6a276f282ae4486723e38e14d6d8f54e177e9c48143e140f58b4bbadc4afddeecf5a92c25ee314316bb3a3ba07cbc57fb773995e1ba296dc574d
-
SSDEEP
393216:IjhkcfRKDBBaxg7X7z08z8QmFv/LvMQcgSxMji+AOXoNuyK/oDP:Ijhky8B8+vZk4qUMPAOXoQyWk
Score8/10-
Checks if the Android device is rooted.
-
Checks Android system properties for emulator presence.
-
Checks Qemu related system properties.
Checks for Android system properties related to Qemu for Emulator detection.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-