General
-
Target
69e49db1d24e5063413b35ec933de2c3_JaffaCakes118
-
Size
30.5MB
-
Sample
240523-f8jjhafc7t
-
MD5
69e49db1d24e5063413b35ec933de2c3
-
SHA1
564618994dd4af76e7585a5d12b4a3c26cafc21c
-
SHA256
33ef3e135999be6e67c27fde1d44ab226c28e5108b851bc1f6e4357aa0254b3e
-
SHA512
e1a7ef97d8e9147db4044b626c89a7623052e0208a51472aa88b13f57ddf17ebecc67f0ba1283e8e5b836e1979f6f86d0d8aefba6683b5ab10b2f76a317d8e53
-
SSDEEP
786432:tMDi1TIC7/+0MzuC5mIZPMdsEQOCeM6CvEuCQLdk+0:B1UC7/+b9miPMdslVeMRvEsS
Static task
static1
Behavioral task
behavioral1
Sample
69e49db1d24e5063413b35ec933de2c3_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
69e49db1d24e5063413b35ec933de2c3_JaffaCakes118
-
Size
30.5MB
-
MD5
69e49db1d24e5063413b35ec933de2c3
-
SHA1
564618994dd4af76e7585a5d12b4a3c26cafc21c
-
SHA256
33ef3e135999be6e67c27fde1d44ab226c28e5108b851bc1f6e4357aa0254b3e
-
SHA512
e1a7ef97d8e9147db4044b626c89a7623052e0208a51472aa88b13f57ddf17ebecc67f0ba1283e8e5b836e1979f6f86d0d8aefba6683b5ab10b2f76a317d8e53
-
SSDEEP
786432:tMDi1TIC7/+0MzuC5mIZPMdsEQOCeM6CvEuCQLdk+0:B1UC7/+b9miPMdslVeMRvEsS
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Reads information about phone network operator.
-
Schedules tasks to execute at a specified time
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
-