General
-
Target
75b99c08d08d62ee43079867a028c5e6_JaffaCakes118
-
Size
8.2MB
-
Sample
240526-rdqvwahg29
-
MD5
75b99c08d08d62ee43079867a028c5e6
-
SHA1
1948018b64b52d47118fd7a2c66d3f599b965180
-
SHA256
79ffc1198e10b9c87fac2e8f49687f17bf05c32e0dde84f5cc4bd6c21f00b944
-
SHA512
e3bbf722dfaf2e86a5125ba4649f497acfc7c51229b03fecac26ef5939edf7c103a217d0aee064d0745a068b2136b8449843d82f5c8926aae5bda6179b240205
-
SSDEEP
196608:Zfk275Q4KPyObjJYqZyE9LlKmXRb4ok0qZJEbJESzgh+N91MTQ:ZRlxKPyObdZzLlBXd4o4ZJeJXU+NHOQ
Static task
static1
Behavioral task
behavioral1
Sample
75b99c08d08d62ee43079867a028c5e6_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
75b99c08d08d62ee43079867a028c5e6_JaffaCakes118
-
Size
8.2MB
-
MD5
75b99c08d08d62ee43079867a028c5e6
-
SHA1
1948018b64b52d47118fd7a2c66d3f599b965180
-
SHA256
79ffc1198e10b9c87fac2e8f49687f17bf05c32e0dde84f5cc4bd6c21f00b944
-
SHA512
e3bbf722dfaf2e86a5125ba4649f497acfc7c51229b03fecac26ef5939edf7c103a217d0aee064d0745a068b2136b8449843d82f5c8926aae5bda6179b240205
-
SSDEEP
196608:Zfk275Q4KPyObjJYqZyE9LlKmXRb4ok0qZJEbJESzgh+N91MTQ:ZRlxKPyObdZzLlBXd4o4ZJeJXU+NHOQ
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Queries the unique device ID (IMEI, MEID, IMSI)
-