General
-
Target
7a89ffaa4e91f87a207ff5fcc7c40f6b_JaffaCakes118
-
Size
15.2MB
-
Sample
240527-z1rdxsbc85
-
MD5
7a89ffaa4e91f87a207ff5fcc7c40f6b
-
SHA1
fdce64c093167f93b913ad097776b0a6085d8262
-
SHA256
dee61a371a52a964ea236c785ba990370ac6824d079cc9f5792181bd86c5b61b
-
SHA512
b9c954bac579604171086a29928987b553f9d45270365e03070421ca48bfaf9e5547f2c975b6b3f4d42bfc9e69e256922ecec3263866fe178ac65355e8b6c00c
-
SSDEEP
393216:94avdRucogV/h/6skWGJH9obCwrMMzDoPa10ZMY:Nd1z/6cGJH93eZ14f
Static task
static1
Behavioral task
behavioral1
Sample
7a89ffaa4e91f87a207ff5fcc7c40f6b_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
7a89ffaa4e91f87a207ff5fcc7c40f6b_JaffaCakes118
-
Size
15.2MB
-
MD5
7a89ffaa4e91f87a207ff5fcc7c40f6b
-
SHA1
fdce64c093167f93b913ad097776b0a6085d8262
-
SHA256
dee61a371a52a964ea236c785ba990370ac6824d079cc9f5792181bd86c5b61b
-
SHA512
b9c954bac579604171086a29928987b553f9d45270365e03070421ca48bfaf9e5547f2c975b6b3f4d42bfc9e69e256922ecec3263866fe178ac65355e8b6c00c
-
SSDEEP
393216:94avdRucogV/h/6skWGJH9obCwrMMzDoPa10ZMY:Nd1z/6cGJH93eZ14f
Score7/10-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Reads information about phone network operator.
-