General
-
Target
6a81fe4e667fcd8257d7a40f74decbfb_JaffaCakes118
-
Size
16.0MB
-
Sample
240523-lky7yacb5t
-
MD5
6a81fe4e667fcd8257d7a40f74decbfb
-
SHA1
555f3907047e6a6f15fae5955fb1367ccfcb9da1
-
SHA256
66eef9edfe15c7bc82392c8ebfcd9d0075faab91dd7081ad36ead1ad1a8f1480
-
SHA512
933ff41fe39052ddfed231b442706aaf2b82031f297d93322f7760bd822383a27ff020c8ad162d0423830a721ab44253e9d4650cc7e95e621e484cda7cd5e2a3
-
SSDEEP
393216:SsCZpZkPhSGkx5hMSx5j5Oo+b+CgWh6EXLTpZ1H:SZJ5hMSx50o+bxRhRXP/d
Static task
static1
Behavioral task
behavioral1
Sample
6a81fe4e667fcd8257d7a40f74decbfb_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
6a81fe4e667fcd8257d7a40f74decbfb_JaffaCakes118.apk
Resource
android-x64-20240514-en
Malware Config
Targets
-
-
Target
6a81fe4e667fcd8257d7a40f74decbfb_JaffaCakes118
-
Size
16.0MB
-
MD5
6a81fe4e667fcd8257d7a40f74decbfb
-
SHA1
555f3907047e6a6f15fae5955fb1367ccfcb9da1
-
SHA256
66eef9edfe15c7bc82392c8ebfcd9d0075faab91dd7081ad36ead1ad1a8f1480
-
SHA512
933ff41fe39052ddfed231b442706aaf2b82031f297d93322f7760bd822383a27ff020c8ad162d0423830a721ab44253e9d4650cc7e95e621e484cda7cd5e2a3
-
SSDEEP
393216:SsCZpZkPhSGkx5hMSx5j5Oo+b+CgWh6EXLTpZ1H:SZJ5hMSx50o+bxRhRXP/d
Score8/10-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-