General
-
Target
693bc726b4f83d9e4cace7096d1ef090_JaffaCakes118
-
Size
29.2MB
-
Sample
240523-bfg3rafg6s
-
MD5
693bc726b4f83d9e4cace7096d1ef090
-
SHA1
7ad18b89cd1d0796c7f234dfe4194567141106ff
-
SHA256
2b141827ac1c168ecf656b7c74491a3123c5b863b60d805b8a0186c2e282a262
-
SHA512
24a7bd59e5e2684af9826a111101c7f6837c43fc4b2115a38396674067cc433a178c92aa68c78c59c40ef1e1cfbf128e188ab3a3b6be116c620de2a950bdaec2
-
SSDEEP
786432:s2NFp7fvw6izpMorKqvPSpgcsC/4zYXAIO9ph4GzFSwQ:v75YiqnVC/ohTFO
Static task
static1
Behavioral task
behavioral1
Sample
693bc726b4f83d9e4cace7096d1ef090_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
693bc726b4f83d9e4cace7096d1ef090_JaffaCakes118
-
Size
29.2MB
-
MD5
693bc726b4f83d9e4cace7096d1ef090
-
SHA1
7ad18b89cd1d0796c7f234dfe4194567141106ff
-
SHA256
2b141827ac1c168ecf656b7c74491a3123c5b863b60d805b8a0186c2e282a262
-
SHA512
24a7bd59e5e2684af9826a111101c7f6837c43fc4b2115a38396674067cc433a178c92aa68c78c59c40ef1e1cfbf128e188ab3a3b6be116c620de2a950bdaec2
-
SSDEEP
786432:s2NFp7fvw6izpMorKqvPSpgcsC/4zYXAIO9ph4GzFSwQ:v75YiqnVC/ohTFO
Score8/10-
Checks if the Android device is rooted.
-
Checks Android system properties for emulator presence.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Acquires the wake lock
-
Checks if the internet connection is available
-
Reads information about phone network operator.
-