General
-
Target
8335bb547dee3905dd7c7d36b8bffe29_JaffaCakes118
-
Size
11.0MB
-
Sample
240530-gjdgmagf3v
-
MD5
8335bb547dee3905dd7c7d36b8bffe29
-
SHA1
c5cd707777287ee350cad69b23fe68e7426bdeac
-
SHA256
45e9c4e683847109146275de24069e2f8b62e7d87cafa8a84345eff0cfebc482
-
SHA512
c0d01e4dd7ab69c87c663d49d31d4272754fbd0ddc2ce0b564ec40d0004d337b643321be2bd40e9094bb6a64971d46f668370a4852bbfa655960301d98bded01
-
SSDEEP
196608:ZIg/1Hcv+0Exq6RG8d785gFM9UTpamI54rQ1oCK/amzU+mBVcCWoA:n/W+o6RG8SD9UTp+4rNBzU+mBVtWoA
Static task
static1
Behavioral task
behavioral1
Sample
8335bb547dee3905dd7c7d36b8bffe29_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
8335bb547dee3905dd7c7d36b8bffe29_JaffaCakes118
-
Size
11.0MB
-
MD5
8335bb547dee3905dd7c7d36b8bffe29
-
SHA1
c5cd707777287ee350cad69b23fe68e7426bdeac
-
SHA256
45e9c4e683847109146275de24069e2f8b62e7d87cafa8a84345eff0cfebc482
-
SHA512
c0d01e4dd7ab69c87c663d49d31d4272754fbd0ddc2ce0b564ec40d0004d337b643321be2bd40e9094bb6a64971d46f668370a4852bbfa655960301d98bded01
-
SSDEEP
196608:ZIg/1Hcv+0Exq6RG8d785gFM9UTpamI54rQ1oCK/amzU+mBVcCWoA:n/W+o6RG8SD9UTp+4rNBzU+mBVtWoA
Score8/10-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Reads information about phone network operator.
-