General
-
Target
6a4c032ed7130c8666ae0d85a4e2ec4b_JaffaCakes118
-
Size
10.5MB
-
Sample
240523-j19mhaad4t
-
MD5
6a4c032ed7130c8666ae0d85a4e2ec4b
-
SHA1
eb6708ad1ab72a72d5b56fee44e1881800cb0189
-
SHA256
7fd6b1fa1eef7be554903634b0dd839357df3655332da5fc8d349c81329e16b4
-
SHA512
1b79e3c203c61f1bf89c703b7ccee2816dc6977ac4b90281bcb62725a429a30f3730cde577b0db86f1d929bdec668006eed2b22c1dbef33f54be21080a77cc5a
-
SSDEEP
196608:9wAy12lsHI+pRqUgjCMlWDnQR+u0xCdi887VSSCdT4Hz+ienyBP:vyGsRMYMlKQR+u0xC87QSCdTwyieoP
Static task
static1
Behavioral task
behavioral1
Sample
6a4c032ed7130c8666ae0d85a4e2ec4b_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
6a4c032ed7130c8666ae0d85a4e2ec4b_JaffaCakes118.apk
Resource
android-33-x64-arm64-20240514-en
Malware Config
Targets
-
-
Target
6a4c032ed7130c8666ae0d85a4e2ec4b_JaffaCakes118
-
Size
10.5MB
-
MD5
6a4c032ed7130c8666ae0d85a4e2ec4b
-
SHA1
eb6708ad1ab72a72d5b56fee44e1881800cb0189
-
SHA256
7fd6b1fa1eef7be554903634b0dd839357df3655332da5fc8d349c81329e16b4
-
SHA512
1b79e3c203c61f1bf89c703b7ccee2816dc6977ac4b90281bcb62725a429a30f3730cde577b0db86f1d929bdec668006eed2b22c1dbef33f54be21080a77cc5a
-
SSDEEP
196608:9wAy12lsHI+pRqUgjCMlWDnQR+u0xCdi887VSSCdT4Hz+ienyBP:vyGsRMYMlKQR+u0xC87QSCdTwyieoP
Score8/10-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Listens for changes in the sensor environment (might be used to detect emulation)
-