General
-
Target
7ac38584aa7a70e9be9fe86c8f9ffb7d_JaffaCakes118
-
Size
10.9MB
-
Sample
240527-2epz3sde25
-
MD5
7ac38584aa7a70e9be9fe86c8f9ffb7d
-
SHA1
84124cca52301bee3068f45505721a9b21f73eba
-
SHA256
e0c423b7aba9f31b5dac46094c639eb611cccc27a217639733ab30e60dfd33a2
-
SHA512
3379ae6954168fec8703a72fd9d75daa588812ba7cae03f19fdca7bb1d0db438ad7e19d82b6a0283ccaeab2141daf465d96e4b9625624d2a5c139a1fd2dcc070
-
SSDEEP
196608:xPB3xMKrWjuCKuUEjQIyUlyEoXS1fvNdlXen28WM:xPvWjuYUE8IyYqX6fVuOM
Static task
static1
Behavioral task
behavioral1
Sample
7ac38584aa7a70e9be9fe86c8f9ffb7d_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
7ac38584aa7a70e9be9fe86c8f9ffb7d_JaffaCakes118.apk
Resource
android-x64-20240514-en
Malware Config
Targets
-
-
Target
7ac38584aa7a70e9be9fe86c8f9ffb7d_JaffaCakes118
-
Size
10.9MB
-
MD5
7ac38584aa7a70e9be9fe86c8f9ffb7d
-
SHA1
84124cca52301bee3068f45505721a9b21f73eba
-
SHA256
e0c423b7aba9f31b5dac46094c639eb611cccc27a217639733ab30e60dfd33a2
-
SHA512
3379ae6954168fec8703a72fd9d75daa588812ba7cae03f19fdca7bb1d0db438ad7e19d82b6a0283ccaeab2141daf465d96e4b9625624d2a5c139a1fd2dcc070
-
SSDEEP
196608:xPB3xMKrWjuCKuUEjQIyUlyEoXS1fvNdlXen28WM:xPvWjuYUE8IyYqX6fVuOM
Score8/10-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-