General
-
Target
6e70900c2d251d59d2c8441f8ad3436d_JaffaCakes118
-
Size
3.4MB
-
Sample
240524-n51bvaha8y
-
MD5
6e70900c2d251d59d2c8441f8ad3436d
-
SHA1
08f87c9c3bbed81dcc3a934d64ddd4d574e34cc5
-
SHA256
823cd7d1b3555671c02b60c884315815af626846996bc74f492124c2b3e0b3b8
-
SHA512
ff4786d6dc5748ce2cf86deb0dba8f288ee4cf3d257bbbca6d5b822067c1580fbc51b60c2ce9aad4c84a75c379b08141a93992d2f79e69fde7ff89ab124f354d
-
SSDEEP
49152:oDxxxx7bEU8qDlmLYNIadK86tmbtBChtLPgCDUQ7+k8nMoYEuwuXe3DzPN/iRZwp:ovDlVNU8LtYhtkC/7+k8nMoNaezzPFT
Static task
static1
Behavioral task
behavioral1
Sample
6e70900c2d251d59d2c8441f8ad3436d_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
6e70900c2d251d59d2c8441f8ad3436d_JaffaCakes118.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral3
Sample
6e70900c2d251d59d2c8441f8ad3436d_JaffaCakes118.apk
Resource
android-x64-arm64-20240514-en
Malware Config
Targets
-
-
Target
6e70900c2d251d59d2c8441f8ad3436d_JaffaCakes118
-
Size
3.4MB
-
MD5
6e70900c2d251d59d2c8441f8ad3436d
-
SHA1
08f87c9c3bbed81dcc3a934d64ddd4d574e34cc5
-
SHA256
823cd7d1b3555671c02b60c884315815af626846996bc74f492124c2b3e0b3b8
-
SHA512
ff4786d6dc5748ce2cf86deb0dba8f288ee4cf3d257bbbca6d5b822067c1580fbc51b60c2ce9aad4c84a75c379b08141a93992d2f79e69fde7ff89ab124f354d
-
SSDEEP
49152:oDxxxx7bEU8qDlmLYNIadK86tmbtBChtLPgCDUQ7+k8nMoYEuwuXe3DzPN/iRZwp:ovDlVNU8LtYhtkC/7+k8nMoNaezzPFT
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-
Schedules tasks to execute at a specified time
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
-