General
-
Target
6dc1825a81e2ec8bcc10a163da8ab267_JaffaCakes118
-
Size
31.7MB
-
Sample
240524-jcwqqshh66
-
MD5
6dc1825a81e2ec8bcc10a163da8ab267
-
SHA1
a59a66b00029b4c14d5db5f533ff1a2ab8de08f1
-
SHA256
4ab315f7ded57f80105a31ccf0c10406828133b73b48d1b248220e755ba65b41
-
SHA512
18950cf0eb5e9664f43ef7ea11639682d6e4e532514e1b4573ef9490766f6373f71dbfa37e9ba1ebe31d24c54037f9a7ca0e095c9dfb31e2e5a69d5425d76ec2
-
SSDEEP
786432:Yw1Uq7i8c4IrynyQNZV2F0CucbdzQna3y:Yw1b7lGenpfVjCuc5Dy
Static task
static1
Behavioral task
behavioral1
Sample
6dc1825a81e2ec8bcc10a163da8ab267_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
6dc1825a81e2ec8bcc10a163da8ab267_JaffaCakes118
-
Size
31.7MB
-
MD5
6dc1825a81e2ec8bcc10a163da8ab267
-
SHA1
a59a66b00029b4c14d5db5f533ff1a2ab8de08f1
-
SHA256
4ab315f7ded57f80105a31ccf0c10406828133b73b48d1b248220e755ba65b41
-
SHA512
18950cf0eb5e9664f43ef7ea11639682d6e4e532514e1b4573ef9490766f6373f71dbfa37e9ba1ebe31d24c54037f9a7ca0e095c9dfb31e2e5a69d5425d76ec2
-
SSDEEP
786432:Yw1Uq7i8c4IrynyQNZV2F0CucbdzQna3y:Yw1b7lGenpfVjCuc5Dy
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Reads information about phone network operator.
-
Listens for changes in the sensor environment (might be used to detect emulation)
-