General
-
Target
6d27828d694f7cd6e228363669f2d6f8_JaffaCakes118
-
Size
14.0MB
-
Sample
240524-drn2jsbb2w
-
MD5
6d27828d694f7cd6e228363669f2d6f8
-
SHA1
1910c1a9ccb1ba227c1119388b9e799b6c427be5
-
SHA256
a4f73010a538fa7ffc01a1ddfadb386f3fce4cdaf1132d6d780df9624f7cde9c
-
SHA512
76fcf4c9530f96fb73afb77d66814a113c7d2cf878236fbed17df658c31f6d604c3a48174815751560c563926b34c6def3052e6524d05cb4e8e15989ba73bcc6
-
SSDEEP
196608:20MowSpU7VL35o53Utlu8Y0kkXzq/la4MpEch68t+3NqSr6LWndV7FPzKp4HLDD4:24pIV3+pUvuykU3hRmz7bQaDdiMK
Static task
static1
Behavioral task
behavioral1
Sample
6d27828d694f7cd6e228363669f2d6f8_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
6d27828d694f7cd6e228363669f2d6f8_JaffaCakes118
-
Size
14.0MB
-
MD5
6d27828d694f7cd6e228363669f2d6f8
-
SHA1
1910c1a9ccb1ba227c1119388b9e799b6c427be5
-
SHA256
a4f73010a538fa7ffc01a1ddfadb386f3fce4cdaf1132d6d780df9624f7cde9c
-
SHA512
76fcf4c9530f96fb73afb77d66814a113c7d2cf878236fbed17df658c31f6d604c3a48174815751560c563926b34c6def3052e6524d05cb4e8e15989ba73bcc6
-
SSDEEP
196608:20MowSpU7VL35o53Utlu8Y0kkXzq/la4MpEch68t+3NqSr6LWndV7FPzKp4HLDD4:24pIV3+pUvuykU3hRmz7bQaDdiMK
Score7/10-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-