General
-
Target
6a7c5255f13dc929c096f385ce848a81_JaffaCakes118
-
Size
21.4MB
-
Sample
240523-le6ptsca33
-
MD5
6a7c5255f13dc929c096f385ce848a81
-
SHA1
903ea534f35656e8843ec1856c2c6b66d83c3431
-
SHA256
134c8dbfb663eb00e0df968a4f4ee9c362ff68c6a8b9fb6599377083063bb800
-
SHA512
c042cb9537d626a1fa0791034bbba85730c9442d995d4a31e2422b0286e48598e48f996fe9d9200d2c0044006096fa9cb6c9a5f751321da6960bb139fbcc0d8b
-
SSDEEP
393216:XQx7hXBkePJ/IKeAuk5StsuBgzmoDzeyyiErh2Tqd/Q9D0QefnHZl3254Wxnr:XW9+wKKe9tqHrydr/Y9IXfnHfaHr
Static task
static1
Behavioral task
behavioral1
Sample
6a7c5255f13dc929c096f385ce848a81_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
6a7c5255f13dc929c096f385ce848a81_JaffaCakes118.apk
Resource
android-x64-20240514-en
Malware Config
Targets
-
-
Target
6a7c5255f13dc929c096f385ce848a81_JaffaCakes118
-
Size
21.4MB
-
MD5
6a7c5255f13dc929c096f385ce848a81
-
SHA1
903ea534f35656e8843ec1856c2c6b66d83c3431
-
SHA256
134c8dbfb663eb00e0df968a4f4ee9c362ff68c6a8b9fb6599377083063bb800
-
SHA512
c042cb9537d626a1fa0791034bbba85730c9442d995d4a31e2422b0286e48598e48f996fe9d9200d2c0044006096fa9cb6c9a5f751321da6960bb139fbcc0d8b
-
SSDEEP
393216:XQx7hXBkePJ/IKeAuk5StsuBgzmoDzeyyiErh2Tqd/Q9D0QefnHZl3254Wxnr:XW9+wKKe9tqHrydr/Y9IXfnHfaHr
Score8/10-
Checks if the Android device is rooted.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads device software version
Uses Android APIs to read software version number for the device (IMEI/SV for GSM devices).
-