General
-
Target
6d46aad80e4e365bc19e9defeefd679f_JaffaCakes118
-
Size
30.9MB
-
Sample
240524-ek9kcacd4w
-
MD5
6d46aad80e4e365bc19e9defeefd679f
-
SHA1
61c77e5af5ad44b331d14c408c94f160b33a01fc
-
SHA256
b0dcbfcf7fd2cabed138bf2da63c9594fc9367126de8c02f44b6c8170e133696
-
SHA512
fd762aa2affaad00aef2209485a79f66da565738e074d257c8058dfd0699aa740d3723c4f045490ff88e7a53278afed6cc9e0c75196b15994bf0b6d403f08e17
-
SSDEEP
786432:K5R97oAb89GsHPDLRRjGIcYpOVKZ3Pl9juRbQziWXj3:GBoGsHPvRRjogOV89yRbQzpXT
Static task
static1
Behavioral task
behavioral1
Sample
6d46aad80e4e365bc19e9defeefd679f_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
6d46aad80e4e365bc19e9defeefd679f_JaffaCakes118
-
Size
30.9MB
-
MD5
6d46aad80e4e365bc19e9defeefd679f
-
SHA1
61c77e5af5ad44b331d14c408c94f160b33a01fc
-
SHA256
b0dcbfcf7fd2cabed138bf2da63c9594fc9367126de8c02f44b6c8170e133696
-
SHA512
fd762aa2affaad00aef2209485a79f66da565738e074d257c8058dfd0699aa740d3723c4f045490ff88e7a53278afed6cc9e0c75196b15994bf0b6d403f08e17
-
SSDEEP
786432:K5R97oAb89GsHPDLRRjGIcYpOVKZ3Pl9juRbQziWXj3:GBoGsHPvRRjogOV89yRbQzpXT
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the phone number (MSISDN for GSM devices)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads device software version
Uses Android APIs to read software version number for the device (IMEI/SV for GSM devices).
-
Reads information about phone network operator.
-