General
-
Target
773ff95a1c6c53bc1d6400d8962125ad_JaffaCakes118
-
Size
594KB
-
Sample
240527-aa1r8sgh6s
-
MD5
773ff95a1c6c53bc1d6400d8962125ad
-
SHA1
5e9cca3061bb368f38e92bba36372ef625499ce2
-
SHA256
8e3180f2e9f98f92cfffab714ba4d8dff38ec9cbcc97f28b6a6889a4a80faf1c
-
SHA512
ad66c3923c4b4ae6ca7517dec7dfb837bfcaaae5a6871080cfc03a8a37b35ccfde5bfd99dfa60f1970b0654030903039db7b459a02e5ac8ca09d792af8c751c8
-
SSDEEP
12288:+RU7eiS0dWvUMsED6BYlVwptxgTsOO009Tp0XnvAQiEjbj:+RP0IvnsEDXixgA1N8hiWj
Static task
static1
Behavioral task
behavioral1
Sample
773ff95a1c6c53bc1d6400d8962125ad_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
773ff95a1c6c53bc1d6400d8962125ad_JaffaCakes118.apk
Resource
android-x64-20240514-en
Malware Config
Targets
-
-
Target
773ff95a1c6c53bc1d6400d8962125ad_JaffaCakes118
-
Size
594KB
-
MD5
773ff95a1c6c53bc1d6400d8962125ad
-
SHA1
5e9cca3061bb368f38e92bba36372ef625499ce2
-
SHA256
8e3180f2e9f98f92cfffab714ba4d8dff38ec9cbcc97f28b6a6889a4a80faf1c
-
SHA512
ad66c3923c4b4ae6ca7517dec7dfb837bfcaaae5a6871080cfc03a8a37b35ccfde5bfd99dfa60f1970b0654030903039db7b459a02e5ac8ca09d792af8c751c8
-
SSDEEP
12288:+RU7eiS0dWvUMsED6BYlVwptxgTsOO009Tp0XnvAQiEjbj:+RP0IvnsEDXixgA1N8hiWj
Score8/10-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries the phone number (MSISDN for GSM devices)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-