General
-
Target
6d099818bd036a9fe026f83cf70f32a9_JaffaCakes118
-
Size
25.7MB
-
Sample
240524-cnqwashf8s
-
MD5
6d099818bd036a9fe026f83cf70f32a9
-
SHA1
f05517c211896cd31945995fcfa4334f4cd7eba9
-
SHA256
beee6a03d6083675c3f97a849740c87f6cdcbf3de4fd8eda5d6405ddfa23b2b0
-
SHA512
3c08396442ac2ebc7d8bdc9808ed3470b4d73397b7d030bfc3336b03f10563c001aff255bc3ba85ec8500263f2c2251f70f4c932dd5ddcd7d3a561816f3a4239
-
SSDEEP
786432:CEtWKGpaj5reki6sxLUWmbQLDEiez0Qz+xBUE9JM:VtgaUFlx4WLLu2BtJM
Static task
static1
Behavioral task
behavioral1
Sample
6d099818bd036a9fe026f83cf70f32a9_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
6d099818bd036a9fe026f83cf70f32a9_JaffaCakes118
-
Size
25.7MB
-
MD5
6d099818bd036a9fe026f83cf70f32a9
-
SHA1
f05517c211896cd31945995fcfa4334f4cd7eba9
-
SHA256
beee6a03d6083675c3f97a849740c87f6cdcbf3de4fd8eda5d6405ddfa23b2b0
-
SHA512
3c08396442ac2ebc7d8bdc9808ed3470b4d73397b7d030bfc3336b03f10563c001aff255bc3ba85ec8500263f2c2251f70f4c932dd5ddcd7d3a561816f3a4239
-
SSDEEP
786432:CEtWKGpaj5reki6sxLUWmbQLDEiez0Qz+xBUE9JM:VtgaUFlx4WLLu2BtJM
Score8/10-
Checks if the Android device is rooted.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Reads information about phone network operator.
-
Listens for changes in the sensor environment (might be used to detect emulation)
-