General
-
Target
77d68d24040b6660abc375e05c2ea6af_JaffaCakes118
-
Size
4.3MB
-
Sample
240527-ej4ygagd58
-
MD5
77d68d24040b6660abc375e05c2ea6af
-
SHA1
9375a06caff0c19e8d20ab35664e54edf406d80f
-
SHA256
266e44fdfd4e89a79f7db14fa60ea9b84f16c7c866ee9c09b22c9971a37ea106
-
SHA512
d0d2cbdcc110509ba95612024e9cdf48e8728a471e8a3f14f1cfb9cc93592261f7d3b68640e81ba8e74f7fc93a796c38306ca6caf8cfadd45696aaee543967f4
-
SSDEEP
98304:YHrQWllqi5hh95RCDLd9G/yPPfYgRHkm19V+vU5rSEVz2E2L:GllbZsDxP7lJ19V/n8
Static task
static1
Behavioral task
behavioral1
Sample
77d68d24040b6660abc375e05c2ea6af_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
77d68d24040b6660abc375e05c2ea6af_JaffaCakes118.apk
Resource
android-x64-20240514-en
Malware Config
Targets
-
-
Target
77d68d24040b6660abc375e05c2ea6af_JaffaCakes118
-
Size
4.3MB
-
MD5
77d68d24040b6660abc375e05c2ea6af
-
SHA1
9375a06caff0c19e8d20ab35664e54edf406d80f
-
SHA256
266e44fdfd4e89a79f7db14fa60ea9b84f16c7c866ee9c09b22c9971a37ea106
-
SHA512
d0d2cbdcc110509ba95612024e9cdf48e8728a471e8a3f14f1cfb9cc93592261f7d3b68640e81ba8e74f7fc93a796c38306ca6caf8cfadd45696aaee543967f4
-
SSDEEP
98304:YHrQWllqi5hh95RCDLd9G/yPPfYgRHkm19V+vU5rSEVz2E2L:GllbZsDxP7lJ19V/n8
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries information about the current nearby Wi-Fi networks
Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Listens for changes in the sensor environment (might be used to detect emulation)
-