General
-
Target
69d0ffeb935e145dd9b475b1b723a1f3_JaffaCakes118
-
Size
1.2MB
-
Sample
240523-fn72csef2s
-
MD5
69d0ffeb935e145dd9b475b1b723a1f3
-
SHA1
f653849cb6453e6cd40c922614d4467a0355ef88
-
SHA256
5779f0e736474c80a0cebb3043103d0519e6cb4bbe80412be242049a328ac921
-
SHA512
4b3ab7a9a8a005a2e1b687b17eba5226162f27774793aff5e49a0a2d32592ea9df19f2e9f2dc42d4affc88776c5bc7a59b081eb46a135c2c2423480e1f9ebc15
-
SSDEEP
24576:9RorYDecBkXQjRruKajDSmgn2aaZUi07+bJTpnDKDa9wmaHG6Vf2V0oQ:9RF3CgjRtajDSmq2aex07+1NnGD8NB67
Static task
static1
Behavioral task
behavioral1
Sample
69d0ffeb935e145dd9b475b1b723a1f3_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
69d0ffeb935e145dd9b475b1b723a1f3_JaffaCakes118
-
Size
1.2MB
-
MD5
69d0ffeb935e145dd9b475b1b723a1f3
-
SHA1
f653849cb6453e6cd40c922614d4467a0355ef88
-
SHA256
5779f0e736474c80a0cebb3043103d0519e6cb4bbe80412be242049a328ac921
-
SHA512
4b3ab7a9a8a005a2e1b687b17eba5226162f27774793aff5e49a0a2d32592ea9df19f2e9f2dc42d4affc88776c5bc7a59b081eb46a135c2c2423480e1f9ebc15
-
SSDEEP
24576:9RorYDecBkXQjRruKajDSmgn2aaZUi07+bJTpnDKDa9wmaHG6Vf2V0oQ:9RF3CgjRtajDSmq2aex07+1NnGD8NB67
Score7/10-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-