General
-
Target
6a79cfa35020707afa59e53925c6b25d_JaffaCakes118
-
Size
30.4MB
-
Sample
240523-lcrswsbh46
-
MD5
6a79cfa35020707afa59e53925c6b25d
-
SHA1
1c6abcba85f9368f77c2a295a423cb806eafa722
-
SHA256
dc8bd4acdb13d4a6ddc6b33f2a8096cf4fc7c89f24015d99331b64a83cee92d9
-
SHA512
690498ab4bac78a0f192207233f38b27146a9769d88cf54f8abb690937cc4da0fbe4c98f30b5b8d466568cde1efa0b10884d8456f8d70881953572af0ad9827a
-
SSDEEP
786432:UIEU1bIC7be4M5iWlOvZP0PsE4WLe32+Tk2CQHB8KB:v1MC7be33OBP0PsBMe3NTkkr
Static task
static1
Behavioral task
behavioral1
Sample
6a79cfa35020707afa59e53925c6b25d_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
6a79cfa35020707afa59e53925c6b25d_JaffaCakes118
-
Size
30.4MB
-
MD5
6a79cfa35020707afa59e53925c6b25d
-
SHA1
1c6abcba85f9368f77c2a295a423cb806eafa722
-
SHA256
dc8bd4acdb13d4a6ddc6b33f2a8096cf4fc7c89f24015d99331b64a83cee92d9
-
SHA512
690498ab4bac78a0f192207233f38b27146a9769d88cf54f8abb690937cc4da0fbe4c98f30b5b8d466568cde1efa0b10884d8456f8d70881953572af0ad9827a
-
SSDEEP
786432:UIEU1bIC7be4M5iWlOvZP0PsE4WLe32+Tk2CQHB8KB:v1MC7be33OBP0PsBMe3NTkkr
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Reads information about phone network operator.
-
Schedules tasks to execute at a specified time
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
-