General
-
Target
6abe0004ee53e69951296aa2f20ab0ab_JaffaCakes118
-
Size
1.3MB
-
Sample
240523-m86glaea59
-
MD5
6abe0004ee53e69951296aa2f20ab0ab
-
SHA1
5a713725e7ae253265b9da89dc6086d605b25d55
-
SHA256
96722dd7dbaa0712be4833540f78c4e42c1f4e55547a3ba81c43be3e0852a8a5
-
SHA512
ffd83adcbee317d68764a170d5dd4ba54bb8be886856872331bc2ad50702122c1003067c8d371d22d7bed9cbc95e90f2aeb1d5de2301374e17b1e63836a0f9e5
-
SSDEEP
24576:C3ToL0otaYtXMheh8X3lUKfcfIkuovSp0Bjbo+kwjYrwq/13tdHbZKm51Ob83z:KMQ7YtQX1wvTvSpGj35jYrwq/1XHNKmr
Static task
static1
Behavioral task
behavioral1
Sample
6abe0004ee53e69951296aa2f20ab0ab_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
6abe0004ee53e69951296aa2f20ab0ab_JaffaCakes118.apk
Resource
android-x64-20240514-en
Malware Config
Targets
-
-
Target
6abe0004ee53e69951296aa2f20ab0ab_JaffaCakes118
-
Size
1.3MB
-
MD5
6abe0004ee53e69951296aa2f20ab0ab
-
SHA1
5a713725e7ae253265b9da89dc6086d605b25d55
-
SHA256
96722dd7dbaa0712be4833540f78c4e42c1f4e55547a3ba81c43be3e0852a8a5
-
SHA512
ffd83adcbee317d68764a170d5dd4ba54bb8be886856872331bc2ad50702122c1003067c8d371d22d7bed9cbc95e90f2aeb1d5de2301374e17b1e63836a0f9e5
-
SSDEEP
24576:C3ToL0otaYtXMheh8X3lUKfcfIkuovSp0Bjbo+kwjYrwq/13tdHbZKm51Ob83z:KMQ7YtQX1wvTvSpGj35jYrwq/1XHNKmr
-
Queries account information for other applications stored on the device
Application may abuse the framework's APIs to collect account information stored on the device.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-