General
-
Target
6d952345be765766e2d62cd1a542a363_JaffaCakes118
-
Size
8.2MB
-
Sample
240524-g4rvragc7v
-
MD5
6d952345be765766e2d62cd1a542a363
-
SHA1
f0cc0c0c1aed5ad4052524b336ca6ae8eee3b324
-
SHA256
0b4e810cc2851db1088c9af45e21a64be17cef9b2bd86020458fd3c798bb1aae
-
SHA512
f7c93321a8b17ecaa45c6b430369753c7ec559d122f7dac5af37f37ba173b3191eac6cca3576c3133a619029d26c0d9673e5c6a2adbce66a47855665ece45d8e
-
SSDEEP
196608:PC1isSA8N9jXU9QyhPAnA85ApfF54UgyJTiAX:JckjEGyIA7pbHGy
Static task
static1
Behavioral task
behavioral1
Sample
6d952345be765766e2d62cd1a542a363_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
6d952345be765766e2d62cd1a542a363_JaffaCakes118
-
Size
8.2MB
-
MD5
6d952345be765766e2d62cd1a542a363
-
SHA1
f0cc0c0c1aed5ad4052524b336ca6ae8eee3b324
-
SHA256
0b4e810cc2851db1088c9af45e21a64be17cef9b2bd86020458fd3c798bb1aae
-
SHA512
f7c93321a8b17ecaa45c6b430369753c7ec559d122f7dac5af37f37ba173b3191eac6cca3576c3133a619029d26c0d9673e5c6a2adbce66a47855665ece45d8e
-
SSDEEP
196608:PC1isSA8N9jXU9QyhPAnA85ApfF54UgyJTiAX:JckjEGyIA7pbHGy
Score8/10-
Checks if the Android device is rooted.
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Queries account information for other applications stored on the device
Application may abuse the framework's APIs to collect account information stored on the device.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Acquires the wake lock
-
Checks if the internet connection is available
-
Checks the presence of a debugger
-