General
-
Target
6bd8da308c7cf8fa0da1e611d4a9b087_JaffaCakes118
-
Size
30.7MB
-
Sample
240523-wy8nmsbf5s
-
MD5
6bd8da308c7cf8fa0da1e611d4a9b087
-
SHA1
73fe9508c5d1aa3ceca2ce394040c91f87b2fcf7
-
SHA256
77ad84363ada96222848165d94f8d192d574486f7ea1a7dd50963fda42afa994
-
SHA512
edc6d6bdd2fd0cb15f6a079d55c618a368f10e3711f5db2d30ddb6b75e1213e8ffc1ebc6a1a27ad2454bdab3d6bb9b6a85c4ae1d62f41eeae8065b1a0899832e
-
SSDEEP
786432:VDLNiBWUOYdzrn0YeoOlJOeLwxmlZmjQd8+z7z:N8AUVf04OlJOaSmv9d7
Static task
static1
Behavioral task
behavioral1
Sample
6bd8da308c7cf8fa0da1e611d4a9b087_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
6bd8da308c7cf8fa0da1e611d4a9b087_JaffaCakes118.apk
Resource
android-33-x64-arm64-20240514-en
Malware Config
Targets
-
-
Target
6bd8da308c7cf8fa0da1e611d4a9b087_JaffaCakes118
-
Size
30.7MB
-
MD5
6bd8da308c7cf8fa0da1e611d4a9b087
-
SHA1
73fe9508c5d1aa3ceca2ce394040c91f87b2fcf7
-
SHA256
77ad84363ada96222848165d94f8d192d574486f7ea1a7dd50963fda42afa994
-
SHA512
edc6d6bdd2fd0cb15f6a079d55c618a368f10e3711f5db2d30ddb6b75e1213e8ffc1ebc6a1a27ad2454bdab3d6bb9b6a85c4ae1d62f41eeae8065b1a0899832e
-
SSDEEP
786432:VDLNiBWUOYdzrn0YeoOlJOeLwxmlZmjQd8+z7z:N8AUVf04OlJOaSmv9d7
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the phone number (MSISDN for GSM devices)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Listens for changes in the sensor environment (might be used to detect emulation)
-