General
-
Target
69d4056f20770dce80992d6da6282afc_JaffaCakes118
-
Size
30.5MB
-
Sample
240523-frn3naef9t
-
MD5
69d4056f20770dce80992d6da6282afc
-
SHA1
cbda3b9f80a62388304d88015777f9623eb51e13
-
SHA256
2e47c67f30e868618cbb72931e5428c785140a5003c3278244794fadf046f75b
-
SHA512
6f3011f675bc4f96d8d77401d2509fdf2f2c6d4d2d66cf294b269c28591f5991f5d77b93e9918d46e5a3438e0ad7a8faa6f6ce6dd2f361d745579a9b5fe8b948
-
SSDEEP
393216:eunU2Nj+FLDG0OHPPe0muS2T0TQm3LL3VXFLgXrjGfbtehGUoic6le1zXrEKk/YQ:1U2NjXhvP9meGF0aehboiPofZJbWgw
Static task
static1
Behavioral task
behavioral1
Sample
69d4056f20770dce80992d6da6282afc_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
69d4056f20770dce80992d6da6282afc_JaffaCakes118
-
Size
30.5MB
-
MD5
69d4056f20770dce80992d6da6282afc
-
SHA1
cbda3b9f80a62388304d88015777f9623eb51e13
-
SHA256
2e47c67f30e868618cbb72931e5428c785140a5003c3278244794fadf046f75b
-
SHA512
6f3011f675bc4f96d8d77401d2509fdf2f2c6d4d2d66cf294b269c28591f5991f5d77b93e9918d46e5a3438e0ad7a8faa6f6ce6dd2f361d745579a9b5fe8b948
-
SSDEEP
393216:eunU2Nj+FLDG0OHPPe0muS2T0TQm3LL3VXFLgXrjGfbtehGUoic6le1zXrEKk/YQ:1U2NjXhvP9meGF0aehboiPofZJbWgw
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the mobile country code (MCC)
-
Queries the phone number (MSISDN for GSM devices)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Reads information about phone network operator.
-