General
-
Target
6a5656de3b8b4a3a0db7295ff75e32d5_JaffaCakes118
-
Size
14.5MB
-
Sample
240523-kbv89aag4x
-
MD5
6a5656de3b8b4a3a0db7295ff75e32d5
-
SHA1
6f57eadea0307d545f6e0e572d7bfba0320d6c49
-
SHA256
133ee36d22eae99ee4a32cbe8c47ac27b479a982ae8f65e00dc78318d349f3ca
-
SHA512
d7a0a0c4ffb94735df9a653ff4f036f73070e7fc980091ec3b2a1fb75474ca6f54c1448c9e08f1d0259c6db86196116ba9f9ed02446101e9720add2901d994f8
-
SSDEEP
393216:QpOpBstqTvEnBVwOov2VL+duy9LwKe+2nta:QpO8HB0196M
Static task
static1
Behavioral task
behavioral1
Sample
6a5656de3b8b4a3a0db7295ff75e32d5_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
6a5656de3b8b4a3a0db7295ff75e32d5_JaffaCakes118.apk
Resource
android-x64-20240514-en
Malware Config
Targets
-
-
Target
6a5656de3b8b4a3a0db7295ff75e32d5_JaffaCakes118
-
Size
14.5MB
-
MD5
6a5656de3b8b4a3a0db7295ff75e32d5
-
SHA1
6f57eadea0307d545f6e0e572d7bfba0320d6c49
-
SHA256
133ee36d22eae99ee4a32cbe8c47ac27b479a982ae8f65e00dc78318d349f3ca
-
SHA512
d7a0a0c4ffb94735df9a653ff4f036f73070e7fc980091ec3b2a1fb75474ca6f54c1448c9e08f1d0259c6db86196116ba9f9ed02446101e9720add2901d994f8
-
SSDEEP
393216:QpOpBstqTvEnBVwOov2VL+duy9LwKe+2nta:QpO8HB0196M
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-