General
-
Target
69a5ccb7408ab06eabb871d0c9112f50_JaffaCakes118
-
Size
30.2MB
-
Sample
240523-eflbysda2v
-
MD5
69a5ccb7408ab06eabb871d0c9112f50
-
SHA1
bbbed63d3f952cbe8dc09f1c16e94cab513f29bd
-
SHA256
3464cbada41c6c9e0d01a7de68806cff27fec5c76bea37e40f99e1a1da6c04ee
-
SHA512
f2b7c2349c06c17038247c5f889a86166a3ee567e02e37c831b418714b20bfcb417c788cacfea2e84aa76335c3df94a1e2d688ca784976e179ecae7b414d4e82
-
SSDEEP
786432:LnqvZtSJyM6sdsMXhK/VbcWK/VpprEy2VryPKRZakxQrLdV:LnqRtSt6WvRK/xrK/bp6VrxaHdV
Static task
static1
Behavioral task
behavioral1
Sample
69a5ccb7408ab06eabb871d0c9112f50_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
69a5ccb7408ab06eabb871d0c9112f50_JaffaCakes118.apk
Resource
android-33-x64-arm64-20240514-en
Malware Config
Targets
-
-
Target
69a5ccb7408ab06eabb871d0c9112f50_JaffaCakes118
-
Size
30.2MB
-
MD5
69a5ccb7408ab06eabb871d0c9112f50
-
SHA1
bbbed63d3f952cbe8dc09f1c16e94cab513f29bd
-
SHA256
3464cbada41c6c9e0d01a7de68806cff27fec5c76bea37e40f99e1a1da6c04ee
-
SHA512
f2b7c2349c06c17038247c5f889a86166a3ee567e02e37c831b418714b20bfcb417c788cacfea2e84aa76335c3df94a1e2d688ca784976e179ecae7b414d4e82
-
SSDEEP
786432:LnqvZtSJyM6sdsMXhK/VbcWK/VpprEy2VryPKRZakxQrLdV:LnqRtSt6WvRK/xrK/bp6VrxaHdV
-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries information about the current nearby Wi-Fi networks
Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Reads information about phone network operator.
-
Checks the presence of a debugger
-