General
-
Target
6a8243d28a7a0ba26eaeee569d698a72_JaffaCakes118
-
Size
14.8MB
-
Sample
240523-llhlkscb6z
-
MD5
6a8243d28a7a0ba26eaeee569d698a72
-
SHA1
f92dc868dcc85a85fbac80e9170f40a4db6d6ff1
-
SHA256
fda7e8431299f095deb828a021ce212bf806901fbab8d8012ad2f8840a72d3bf
-
SHA512
b6970d0c14008dbf4c0a4cebc46c7eebe62d18d6138932a29e339ec394acc896045f82f516b799765152a288fe4a8149ea0bb91c64746f0ddce571459a975362
-
SSDEEP
393216:vDOZh55AImBebRr1SLHU0ClJmBavWUuenYLTs44:aZr5ANebRr4LHlClR0ecId
Static task
static1
Behavioral task
behavioral1
Sample
6a8243d28a7a0ba26eaeee569d698a72_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
6a8243d28a7a0ba26eaeee569d698a72_JaffaCakes118
-
Size
14.8MB
-
MD5
6a8243d28a7a0ba26eaeee569d698a72
-
SHA1
f92dc868dcc85a85fbac80e9170f40a4db6d6ff1
-
SHA256
fda7e8431299f095deb828a021ce212bf806901fbab8d8012ad2f8840a72d3bf
-
SHA512
b6970d0c14008dbf4c0a4cebc46c7eebe62d18d6138932a29e339ec394acc896045f82f516b799765152a288fe4a8149ea0bb91c64746f0ddce571459a975362
-
SSDEEP
393216:vDOZh55AImBebRr1SLHU0ClJmBavWUuenYLTs44:aZr5ANebRr4LHlClR0ecId
Score7/10-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-