General
-
Target
6a80ef189ac8d04756163358d5956c05_JaffaCakes118
-
Size
15.1MB
-
Sample
240523-lj5nbscb3v
-
MD5
6a80ef189ac8d04756163358d5956c05
-
SHA1
fb348666c06882d648dde2f0024f6abae9c22e1c
-
SHA256
9c9ca1d052263bd1c2a0ad35b656e78e2644c5d84fbdf4405aff6d3745eba4b3
-
SHA512
42cb82c4e1d76bbcbdd7db9b58b27dd9ef3f407e512e6106d202e9fe85c3be9db9227b9766145003d987f0f26a9c58e623cbf32805859abc5b9ee19847d7a28a
-
SSDEEP
196608:NdW7YmcRJ0Dapphhyw7mpk8PVCZzgq3lr5SSEDMysS5nAtYt1V/v2vhCa8H:LW7Bs0DozJam4VCrVr5iDlhl1VP
Static task
static1
Behavioral task
behavioral1
Sample
6a80ef189ac8d04756163358d5956c05_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
6a80ef189ac8d04756163358d5956c05_JaffaCakes118
-
Size
15.1MB
-
MD5
6a80ef189ac8d04756163358d5956c05
-
SHA1
fb348666c06882d648dde2f0024f6abae9c22e1c
-
SHA256
9c9ca1d052263bd1c2a0ad35b656e78e2644c5d84fbdf4405aff6d3745eba4b3
-
SHA512
42cb82c4e1d76bbcbdd7db9b58b27dd9ef3f407e512e6106d202e9fe85c3be9db9227b9766145003d987f0f26a9c58e623cbf32805859abc5b9ee19847d7a28a
-
SSDEEP
196608:NdW7YmcRJ0Dapphhyw7mpk8PVCZzgq3lr5SSEDMysS5nAtYt1V/v2vhCa8H:LW7Bs0DozJam4VCrVr5iDlhl1VP
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-