General
-
Target
853d6b692e340d815514e4010409ed1e_JaffaCakes118
-
Size
12.7MB
-
Sample
240530-29r3xsdf9y
-
MD5
853d6b692e340d815514e4010409ed1e
-
SHA1
f68c6ea3e4ccba47d4a1a0fe3857d4d84d136e35
-
SHA256
93eef0c586d60241e6e6daef4c370d1e9bf1f0647ddbfd9df44b8e067aa9169f
-
SHA512
f5834c1a27b44f659e589caca7e7d5c94f86d0dcf8fdd9d3e27e637d884b97d9d2c48346da12a8b082df06b2e50ab1a6e91953ec0e7c629db6cbd66f69930e7b
-
SSDEEP
393216:Y9y6gUXSpNEmbtHxzJV7pzFgclEty2q75:YfrSNEaxzJlpzXOyN75
Static task
static1
Behavioral task
behavioral1
Sample
853d6b692e340d815514e4010409ed1e_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
853d6b692e340d815514e4010409ed1e_JaffaCakes118.apk
Resource
android-x64-arm64-20240514-en
Malware Config
Targets
-
-
Target
853d6b692e340d815514e4010409ed1e_JaffaCakes118
-
Size
12.7MB
-
MD5
853d6b692e340d815514e4010409ed1e
-
SHA1
f68c6ea3e4ccba47d4a1a0fe3857d4d84d136e35
-
SHA256
93eef0c586d60241e6e6daef4c370d1e9bf1f0647ddbfd9df44b8e067aa9169f
-
SHA512
f5834c1a27b44f659e589caca7e7d5c94f86d0dcf8fdd9d3e27e637d884b97d9d2c48346da12a8b082df06b2e50ab1a6e91953ec0e7c629db6cbd66f69930e7b
-
SSDEEP
393216:Y9y6gUXSpNEmbtHxzJV7pzFgclEty2q75:YfrSNEaxzJlpzXOyN75
Score7/10-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Reads information about phone network operator.
-