General
-
Target
7805560ac381d6523ceb9d88686b180c_JaffaCakes118
-
Size
31.2MB
-
Sample
240527-fyatlsac94
-
MD5
7805560ac381d6523ceb9d88686b180c
-
SHA1
63ba9a3b1c7d7212231f42ef91d7334b0045dba6
-
SHA256
b23206e9febe071f0647d8cfa9970d5539c582037f7036eedfd342ebab0a2129
-
SHA512
247d1aed153d0044fbdebd206d1f0fb0d28fe95569d268a9f4313850a50133207bfae8037a969f35e74b595d498d64e1513420e13213b4f3d27f33a14e34baf2
-
SSDEEP
786432:RTSj3kzD/AOPOjOnhxshGYqVWv680hkLK353PUCq:gj3kH/AOPOjOhxsAk66+J3P/q
Static task
static1
Behavioral task
behavioral1
Sample
7805560ac381d6523ceb9d88686b180c_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
7805560ac381d6523ceb9d88686b180c_JaffaCakes118.apk
Resource
android-x64-20240514-en
Malware Config
Targets
-
-
Target
7805560ac381d6523ceb9d88686b180c_JaffaCakes118
-
Size
31.2MB
-
MD5
7805560ac381d6523ceb9d88686b180c
-
SHA1
63ba9a3b1c7d7212231f42ef91d7334b0045dba6
-
SHA256
b23206e9febe071f0647d8cfa9970d5539c582037f7036eedfd342ebab0a2129
-
SHA512
247d1aed153d0044fbdebd206d1f0fb0d28fe95569d268a9f4313850a50133207bfae8037a969f35e74b595d498d64e1513420e13213b4f3d27f33a14e34baf2
-
SSDEEP
786432:RTSj3kzD/AOPOjOnhxshGYqVWv680hkLK353PUCq:gj3kH/AOPOjOhxsAk66+J3P/q
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-