General
-
Target
6a8b71a328406875da4a65c691d37724_JaffaCakes118
-
Size
29.6MB
-
Sample
240523-lt379acd8t
-
MD5
6a8b71a328406875da4a65c691d37724
-
SHA1
66da74df5f3ed8923ae016f7500ad00e85b4e5b3
-
SHA256
6947edf81888e388efdde1aef467f0ce36a531c0036bc1ed5a9c7eb63d8fbc32
-
SHA512
c2e4068b27c42cf84321e872ef1840a64e37cc619fe024ee4a0ac860bbd5c7e02e54b14db229cf332e145895811c8d34ab955301d6a61eae343cd06abb79775e
-
SSDEEP
786432:vddGtT6hz+czYK/VVK/VCja9MkQixU2uvUcLLlPOj/kDCioK:vDGghzlYK/DK/NikQMUDUGPwm
Static task
static1
Behavioral task
behavioral1
Sample
6a8b71a328406875da4a65c691d37724_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
6a8b71a328406875da4a65c691d37724_JaffaCakes118.apk
Resource
android-x64-20240514-en
Malware Config
Targets
-
-
Target
6a8b71a328406875da4a65c691d37724_JaffaCakes118
-
Size
29.6MB
-
MD5
6a8b71a328406875da4a65c691d37724
-
SHA1
66da74df5f3ed8923ae016f7500ad00e85b4e5b3
-
SHA256
6947edf81888e388efdde1aef467f0ce36a531c0036bc1ed5a9c7eb63d8fbc32
-
SHA512
c2e4068b27c42cf84321e872ef1840a64e37cc619fe024ee4a0ac860bbd5c7e02e54b14db229cf332e145895811c8d34ab955301d6a61eae343cd06abb79775e
-
SSDEEP
786432:vddGtT6hz+czYK/VVK/VCja9MkQixU2uvUcLLlPOj/kDCioK:vDGghzlYK/DK/NikQMUDUGPwm
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-