General
-
Target
6d487c0c213c35bc605d5750fee2c9e7_JaffaCakes118
-
Size
28.5MB
-
Sample
240524-em36cace2x
-
MD5
6d487c0c213c35bc605d5750fee2c9e7
-
SHA1
8c2b67716f97d47c481d689f624827483228d43d
-
SHA256
f6692c2aaf199bce313d88a25867e5b2345dd797cc4cd55dcb632db3a1403b3a
-
SHA512
24aca1e881db32d4bca12c339f5355a6c971ce58e4fa47f309f4861f81e32662ddf5f807f4f0e295eb45488d61c31102a6da1f92d02573e9f2b3a90209ddfe11
-
SSDEEP
393216:Nym8o8pBtfb7SG+3eXiwROLDW2DWWHLe3hickZ4ic5TJka2LUyLt7P/hPxwykowK:NHifbp+uXlcWELcYhGtsLFPAK
Static task
static1
Behavioral task
behavioral1
Sample
6d487c0c213c35bc605d5750fee2c9e7_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
6d487c0c213c35bc605d5750fee2c9e7_JaffaCakes118
-
Size
28.5MB
-
MD5
6d487c0c213c35bc605d5750fee2c9e7
-
SHA1
8c2b67716f97d47c481d689f624827483228d43d
-
SHA256
f6692c2aaf199bce313d88a25867e5b2345dd797cc4cd55dcb632db3a1403b3a
-
SHA512
24aca1e881db32d4bca12c339f5355a6c971ce58e4fa47f309f4861f81e32662ddf5f807f4f0e295eb45488d61c31102a6da1f92d02573e9f2b3a90209ddfe11
-
SSDEEP
393216:Nym8o8pBtfb7SG+3eXiwROLDW2DWWHLe3hickZ4ic5TJka2LUyLt7P/hPxwykowK:NHifbp+uXlcWELcYhGtsLFPAK
Score7/10-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-