General
-
Target
6e4b32fd70af981e51d1dc019bc8e734_JaffaCakes118
-
Size
12.3MB
-
Sample
240524-m7st4seg38
-
MD5
6e4b32fd70af981e51d1dc019bc8e734
-
SHA1
41a0cd3fe31110e3f5f95dfd495947eae8ccfaaa
-
SHA256
b584429c7909dd1a03eaec9caa71a3d9811481ea6ed8d0f016f0d0d73234c440
-
SHA512
b3318988ae28fb1d7b0b1c4458116b9e54ba0b871b7b167f2f69a2dec7ccd87f855e68f288a8887ddfc0ad37c92d864d0f514538bff2912f71903ff53c377ec6
-
SSDEEP
393216:20dlpS71B6PxvEdCsOtC4bBpMdT0slTKUTzcRRD:dSZB60FkCKBmJ0GTKNR
Static task
static1
Behavioral task
behavioral1
Sample
6e4b32fd70af981e51d1dc019bc8e734_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
6e4b32fd70af981e51d1dc019bc8e734_JaffaCakes118.apk
Resource
android-33-x64-arm64-20240514-en
Malware Config
Targets
-
-
Target
6e4b32fd70af981e51d1dc019bc8e734_JaffaCakes118
-
Size
12.3MB
-
MD5
6e4b32fd70af981e51d1dc019bc8e734
-
SHA1
41a0cd3fe31110e3f5f95dfd495947eae8ccfaaa
-
SHA256
b584429c7909dd1a03eaec9caa71a3d9811481ea6ed8d0f016f0d0d73234c440
-
SHA512
b3318988ae28fb1d7b0b1c4458116b9e54ba0b871b7b167f2f69a2dec7ccd87f855e68f288a8887ddfc0ad37c92d864d0f514538bff2912f71903ff53c377ec6
-
SSDEEP
393216:20dlpS71B6PxvEdCsOtC4bBpMdT0slTKUTzcRRD:dSZB60FkCKBmJ0GTKNR
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Reads information about phone network operator.
-