General
-
Target
6da4a83c571ddf474cd3d65acec6c112_JaffaCakes118
-
Size
1.1MB
-
Sample
240524-hkamssgg82
-
MD5
6da4a83c571ddf474cd3d65acec6c112
-
SHA1
735e22851a7edce0e1c530a56b9c61048172c7fb
-
SHA256
0abb6cd6101885c09e4f77d14784b614138ca5b9d8dc1239cbcb11fbf1696b12
-
SHA512
02abe57757e65e90dba7a1264e58208cd58445e4e5f0b311f6a0630d3cc585e2883f4fa83ff4b865e40d8bc7e696a45f150c6cbd5a09d732e8c2f03d37adc0a6
-
SSDEEP
24576:G+GIt3/L89zYa5ARE3vd+m/A0ad7bHeKZCg9zS7DmbIf/I1hQcy:XoAIvd+l0aJMMu/3sny
Static task
static1
Behavioral task
behavioral1
Sample
6da4a83c571ddf474cd3d65acec6c112_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
6da4a83c571ddf474cd3d65acec6c112_JaffaCakes118
-
Size
1.1MB
-
MD5
6da4a83c571ddf474cd3d65acec6c112
-
SHA1
735e22851a7edce0e1c530a56b9c61048172c7fb
-
SHA256
0abb6cd6101885c09e4f77d14784b614138ca5b9d8dc1239cbcb11fbf1696b12
-
SHA512
02abe57757e65e90dba7a1264e58208cd58445e4e5f0b311f6a0630d3cc585e2883f4fa83ff4b865e40d8bc7e696a45f150c6cbd5a09d732e8c2f03d37adc0a6
-
SSDEEP
24576:G+GIt3/L89zYa5ARE3vd+m/A0ad7bHeKZCg9zS7DmbIf/I1hQcy:XoAIvd+l0aJMMu/3sny
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Queries the unique device ID (IMEI, MEID, IMSI)
-