General
-
Target
6e2f768166eadc7c3c59008e4d7d76ac_JaffaCakes118
-
Size
30.7MB
-
Sample
240524-men1fsdf74
-
MD5
6e2f768166eadc7c3c59008e4d7d76ac
-
SHA1
1f79376ba671cddc9440d3ca6777da9542282d41
-
SHA256
302418ca0a34fa17356ad212aac99cffefc49e004b63418841b9e57d3e43b12f
-
SHA512
0fa87c0e435f528b26b01ba3ca2c2f32b63528921de9211a1b36f21efefb40e61a01b11e27d000d7d35dad5ab4238b29d1cd97553a1611f5a20909c8ff78f767
-
SSDEEP
786432:n5U7jkppa2YGGed8nLFAdOzfySMhgztgXEqKdLgLwPk207:i7KpmDgSAdOzfpMS5CKdgLwPk24
Static task
static1
Behavioral task
behavioral1
Sample
6e2f768166eadc7c3c59008e4d7d76ac_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
6e2f768166eadc7c3c59008e4d7d76ac_JaffaCakes118.apk
Resource
android-x64-arm64-20240514-en
Malware Config
Targets
-
-
Target
6e2f768166eadc7c3c59008e4d7d76ac_JaffaCakes118
-
Size
30.7MB
-
MD5
6e2f768166eadc7c3c59008e4d7d76ac
-
SHA1
1f79376ba671cddc9440d3ca6777da9542282d41
-
SHA256
302418ca0a34fa17356ad212aac99cffefc49e004b63418841b9e57d3e43b12f
-
SHA512
0fa87c0e435f528b26b01ba3ca2c2f32b63528921de9211a1b36f21efefb40e61a01b11e27d000d7d35dad5ab4238b29d1cd97553a1611f5a20909c8ff78f767
-
SSDEEP
786432:n5U7jkppa2YGGed8nLFAdOzfySMhgztgXEqKdLgLwPk207:i7KpmDgSAdOzfpMS5CKdgLwPk24
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Listens for changes in the sensor environment (might be used to detect emulation)
-