General
-
Target
6e675186db3d494e442b1cb48ef59a9e_JaffaCakes118
-
Size
15.1MB
-
Sample
240524-nyhhfsgb2t
-
MD5
6e675186db3d494e442b1cb48ef59a9e
-
SHA1
d4aa523f0b9528405ca37bec0a54e178c622a331
-
SHA256
f13a55d3c7d450d31bf2cde8ecc50b182a859083bf3ad3b488faa8508e37c12c
-
SHA512
294a2f2e38a3086a404452ff5e98749e50b6e61109a051e6de03832c4389f41a77eb02e1023b077b8b87abe70a039aff1a88f179537a3b63a1ec86097ce7adeb
-
SSDEEP
393216:683oi8v0YT0kOgpTFQqMxqIurTKuzpO2qjt:68YiA0YAeFHQqIuxsFx
Static task
static1
Behavioral task
behavioral1
Sample
6e675186db3d494e442b1cb48ef59a9e_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
6e675186db3d494e442b1cb48ef59a9e_JaffaCakes118
-
Size
15.1MB
-
MD5
6e675186db3d494e442b1cb48ef59a9e
-
SHA1
d4aa523f0b9528405ca37bec0a54e178c622a331
-
SHA256
f13a55d3c7d450d31bf2cde8ecc50b182a859083bf3ad3b488faa8508e37c12c
-
SHA512
294a2f2e38a3086a404452ff5e98749e50b6e61109a051e6de03832c4389f41a77eb02e1023b077b8b87abe70a039aff1a88f179537a3b63a1ec86097ce7adeb
-
SSDEEP
393216:683oi8v0YT0kOgpTFQqMxqIurTKuzpO2qjt:68YiA0YAeFHQqIuxsFx
Score8/10-
Checks if the Android device is rooted.
-
Checks Android system properties for emulator presence.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-