General
-
Target
6deb68dbba0c53bb20bbababb3879df7_JaffaCakes118
-
Size
20.6MB
-
Sample
240524-kmclaabe99
-
MD5
6deb68dbba0c53bb20bbababb3879df7
-
SHA1
31b94616c9564344a40e12483a8564fbcfbf2e81
-
SHA256
1f748f4f923820776d411279e065e24acece9d2bd7d1a620289a2026737d55f7
-
SHA512
98026e3d17864011a806076d896a55c4bee641c944f13456286fc173242369a6a608f690475c129d3d284646fa7553a4435c11e4e0cf449692cab7b13aff571c
-
SSDEEP
393216:15de5Yf+4PMrYeF7ueD/BGN9h9CAGk0KpBtT4rFvdc4rFvdkbHUcbRLxojV:bL+4PMrYs7ueDJG3hQAGk0K94Rvdc4Rh
Static task
static1
Behavioral task
behavioral1
Sample
6deb68dbba0c53bb20bbababb3879df7_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
6deb68dbba0c53bb20bbababb3879df7_JaffaCakes118
-
Size
20.6MB
-
MD5
6deb68dbba0c53bb20bbababb3879df7
-
SHA1
31b94616c9564344a40e12483a8564fbcfbf2e81
-
SHA256
1f748f4f923820776d411279e065e24acece9d2bd7d1a620289a2026737d55f7
-
SHA512
98026e3d17864011a806076d896a55c4bee641c944f13456286fc173242369a6a608f690475c129d3d284646fa7553a4435c11e4e0cf449692cab7b13aff571c
-
SSDEEP
393216:15de5Yf+4PMrYeF7ueD/BGN9h9CAGk0KpBtT4rFvdc4rFvdkbHUcbRLxojV:bL+4PMrYs7ueDJG3hQAGk0K94Rvdc4Rh
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries the mobile country code (MCC)
-
Reads the content of the call log.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Listens for changes in the sensor environment (might be used to detect emulation)
-