General
-
Target
6a574bd205a965a3dd98c73f298d18c8_JaffaCakes118
-
Size
22.7MB
-
Sample
240523-kcsjraag54
-
MD5
6a574bd205a965a3dd98c73f298d18c8
-
SHA1
6215d46e938a8ed2283670ccd574adec4b663c37
-
SHA256
4f741736c872428c891ee892f9fa4b0ab7a98662b9b73556641a7ead144352c5
-
SHA512
85cee1ccbe351565c6acd818118db25629e113d9deeaee9038d99d347b0dd4bb8e2d48dbcc4cf17b0c08ae867309ea2ae7b0399404ecb4c50a81313bd5e8a669
-
SSDEEP
393216:033IeLpluNKBBj+Jol/XA1imiZa1cmE9dl2uFPV2TTVPEgkbRhM0mDdp7j8wS/4+:OIIXuNKBBj+wdY1cnPjFPQV8gw7LUXS1
Static task
static1
Behavioral task
behavioral1
Sample
6a574bd205a965a3dd98c73f298d18c8_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
6a574bd205a965a3dd98c73f298d18c8_JaffaCakes118.apk
Resource
android-x64-20240514-en
Malware Config
Targets
-
-
Target
6a574bd205a965a3dd98c73f298d18c8_JaffaCakes118
-
Size
22.7MB
-
MD5
6a574bd205a965a3dd98c73f298d18c8
-
SHA1
6215d46e938a8ed2283670ccd574adec4b663c37
-
SHA256
4f741736c872428c891ee892f9fa4b0ab7a98662b9b73556641a7ead144352c5
-
SHA512
85cee1ccbe351565c6acd818118db25629e113d9deeaee9038d99d347b0dd4bb8e2d48dbcc4cf17b0c08ae867309ea2ae7b0399404ecb4c50a81313bd5e8a669
-
SSDEEP
393216:033IeLpluNKBBj+Jol/XA1imiZa1cmE9dl2uFPV2TTVPEgkbRhM0mDdp7j8wS/4+:OIIXuNKBBj+wdY1cnPjFPQV8gw7LUXS1
Score7/10-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-