General
-
Target
6a9c8ed5cba2781bdd66a139e65b3847_JaffaCakes118
-
Size
28.9MB
-
Sample
240523-l98snsch37
-
MD5
6a9c8ed5cba2781bdd66a139e65b3847
-
SHA1
d32f6cf7e9ea78f741f339a7388a2120e27b9f3c
-
SHA256
7ee64ded702588b0927db5345f7476284f2b48e4dcaa243a7cad176baee18441
-
SHA512
fe8c8b357fae093a72fddbdd357e027bae16862d655bf4421303d5a13293e2b4838554f30a1e3af15053ff77092f7b11bcf72c77b3d98b6e64df8c53d96e9135
-
SSDEEP
393216:v+GC9FI1Ux0qKCUWAOjas0lgiurWlG95ObBZ04krqD2G5GFKCrZFsxDdvBA78B2o:v+f9i7/CJascgZOGLoU4fSaGEC1ucQcu
Static task
static1
Behavioral task
behavioral1
Sample
6a9c8ed5cba2781bdd66a139e65b3847_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
6a9c8ed5cba2781bdd66a139e65b3847_JaffaCakes118
-
Size
28.9MB
-
MD5
6a9c8ed5cba2781bdd66a139e65b3847
-
SHA1
d32f6cf7e9ea78f741f339a7388a2120e27b9f3c
-
SHA256
7ee64ded702588b0927db5345f7476284f2b48e4dcaa243a7cad176baee18441
-
SHA512
fe8c8b357fae093a72fddbdd357e027bae16862d655bf4421303d5a13293e2b4838554f30a1e3af15053ff77092f7b11bcf72c77b3d98b6e64df8c53d96e9135
-
SSDEEP
393216:v+GC9FI1Ux0qKCUWAOjas0lgiurWlG95ObBZ04krqD2G5GFKCrZFsxDdvBA78B2o:v+f9i7/CJascgZOGLoU4fSaGEC1ucQcu
Score9/10-
Renames multiple (80) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks if the Android device is rooted.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Acquires the wake lock
-
Checks if the internet connection is available
-