General
-
Target
6e918c71724d5485748d97e93b9dae86_JaffaCakes118
-
Size
18.3MB
-
Sample
240524-pz8ayadc87
-
MD5
6e918c71724d5485748d97e93b9dae86
-
SHA1
6c6485034d35bdaa608b4253b06be19cb0d89696
-
SHA256
41d201d3808f58997abbcfdf5ef5bed8551c77e3b239477445b1a2557fed9e6f
-
SHA512
3707666fc52552bd314dcc2abfa4064445249cf4a9301b80b116603f17733efaaa7cc19e578cdcb3b1f03a992158e93fe01f2a4cff20c20da0edaeaf62a72c7e
-
SSDEEP
393216:xLtKL28Du23iskc7scZUdQ3LnEH1x70wP5ODGWy23uMVr+WN6:Kbosf7soH3TEHXBh8wkuMVrm
Static task
static1
Behavioral task
behavioral1
Sample
6e918c71724d5485748d97e93b9dae86_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
6e918c71724d5485748d97e93b9dae86_JaffaCakes118
-
Size
18.3MB
-
MD5
6e918c71724d5485748d97e93b9dae86
-
SHA1
6c6485034d35bdaa608b4253b06be19cb0d89696
-
SHA256
41d201d3808f58997abbcfdf5ef5bed8551c77e3b239477445b1a2557fed9e6f
-
SHA512
3707666fc52552bd314dcc2abfa4064445249cf4a9301b80b116603f17733efaaa7cc19e578cdcb3b1f03a992158e93fe01f2a4cff20c20da0edaeaf62a72c7e
-
SSDEEP
393216:xLtKL28Du23iskc7scZUdQ3LnEH1x70wP5ODGWy23uMVr+WN6:Kbosf7soH3TEHXBh8wkuMVrm
-
Checks if the Android device is rooted.
-
Checks Android system properties for emulator presence.
-
Checks known Qemu files.
Checks for known Qemu files that exist on Android virtual device images.
-
Checks known Qemu pipes.
Checks for known pipes used by the Android emulator to communicate with the host.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-