General
-
Target
6987d5d692b94b7e70c5e989b73998f7_JaffaCakes118
-
Size
14.5MB
-
Sample
240523-djpywabe8z
-
MD5
6987d5d692b94b7e70c5e989b73998f7
-
SHA1
08d0a2d02f7784fd799ab613b8539968bb937d3c
-
SHA256
f3047a26ce2324eaef32ae0ce75c8ac94c6868b810b12eea838fe864f4b172b0
-
SHA512
446205947d3cccedcae94b82bdaff9e9f76dbdc6621dc3a838143926c4a8fdfbdd1edf55f7e4dc1ef8731f7ff66156ca590720f8d9bdcb71293a4716eddbbe0e
-
SSDEEP
196608:AsTQg25hhXAATXIINx+yjqPkO71G+8Lg12VL+fnFuCp9L4jEwPx2Y0H+WB2FNGIW:AsTyhhJT4INTo12VL+duy9LwKe+2ntM
Static task
static1
Behavioral task
behavioral1
Sample
6987d5d692b94b7e70c5e989b73998f7_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
6987d5d692b94b7e70c5e989b73998f7_JaffaCakes118
-
Size
14.5MB
-
MD5
6987d5d692b94b7e70c5e989b73998f7
-
SHA1
08d0a2d02f7784fd799ab613b8539968bb937d3c
-
SHA256
f3047a26ce2324eaef32ae0ce75c8ac94c6868b810b12eea838fe864f4b172b0
-
SHA512
446205947d3cccedcae94b82bdaff9e9f76dbdc6621dc3a838143926c4a8fdfbdd1edf55f7e4dc1ef8731f7ff66156ca590720f8d9bdcb71293a4716eddbbe0e
-
SSDEEP
196608:AsTQg25hhXAATXIINx+yjqPkO71G+8Lg12VL+fnFuCp9L4jEwPx2Y0H+WB2FNGIW:AsTyhhJT4INTo12VL+duy9LwKe+2ntM
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Reads information about phone network operator.
-