General
-
Target
6da476504ee467e55293d4c974278636_JaffaCakes118
-
Size
1.7MB
-
Sample
240524-hjx2psgh4x
-
MD5
6da476504ee467e55293d4c974278636
-
SHA1
601253b91a287e54752d6dae682ad4751c898af0
-
SHA256
2a281f4b8b8e93889ebc6087aaf2140e84f7b28f4581571e1b72525552e821e1
-
SHA512
413441db6859f933ab4f50851bec9d0886c68dc19905dca12c2c1dba90b002b3b4b6dc58d2f4d9760c94750c89d7ae3bc66117b0178dd6754bd0cc55e7b5e2a6
-
SSDEEP
24576:Rc0DR/V+CDjsj/DuVzHAkgAQ7Mo6iHWhAIdlU9crZyf+4B4m4Y0xTCYgt+I2GsKe:RJhDEI4AUaR6olPrZyf8m4TC1+UsF
Static task
static1
Behavioral task
behavioral1
Sample
6da476504ee467e55293d4c974278636_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
6da476504ee467e55293d4c974278636_JaffaCakes118
-
Size
1.7MB
-
MD5
6da476504ee467e55293d4c974278636
-
SHA1
601253b91a287e54752d6dae682ad4751c898af0
-
SHA256
2a281f4b8b8e93889ebc6087aaf2140e84f7b28f4581571e1b72525552e821e1
-
SHA512
413441db6859f933ab4f50851bec9d0886c68dc19905dca12c2c1dba90b002b3b4b6dc58d2f4d9760c94750c89d7ae3bc66117b0178dd6754bd0cc55e7b5e2a6
-
SSDEEP
24576:Rc0DR/V+CDjsj/DuVzHAkgAQ7Mo6iHWhAIdlU9crZyf+4B4m4Y0xTCYgt+I2GsKe:RJhDEI4AUaR6olPrZyf8m4TC1+UsF
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the mobile country code (MCC)
-
Reads the content of SMS inbox messages.
-
Reads the content of the SMS messages.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Reads information about phone network operator.
-
Requests dangerous framework permissions
-