General
-
Target
842c0ebcc866588dd34db43767c7675b_JaffaCakes118
-
Size
18.0MB
-
Sample
240530-pjapqshg35
-
MD5
842c0ebcc866588dd34db43767c7675b
-
SHA1
8295825359d792eacfbaa4db8231a81d93198dc8
-
SHA256
7fa9f7ba30a692886df2e181c10b16740a4b9272b2ed7ff9ad17e04c3828bf6c
-
SHA512
db6d27fb94965e506297a7b564d2ffba494b7a9c4be1c8d1874b0e90121a8e972f448b0f8f51f983ce3d18a37deb6f5cde311d6fc8538e1d349403c516a6e0be
-
SSDEEP
393216:QmM+tW4Dd2VzzrZkLJCIUex0y4AtUb9PCfGxdfW6gQzKsL/6gc96yAyqTiSy:Qt+tW4ARd160CCb9PQGq6goPc9KRy
Static task
static1
Behavioral task
behavioral1
Sample
842c0ebcc866588dd34db43767c7675b_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
842c0ebcc866588dd34db43767c7675b_JaffaCakes118
-
Size
18.0MB
-
MD5
842c0ebcc866588dd34db43767c7675b
-
SHA1
8295825359d792eacfbaa4db8231a81d93198dc8
-
SHA256
7fa9f7ba30a692886df2e181c10b16740a4b9272b2ed7ff9ad17e04c3828bf6c
-
SHA512
db6d27fb94965e506297a7b564d2ffba494b7a9c4be1c8d1874b0e90121a8e972f448b0f8f51f983ce3d18a37deb6f5cde311d6fc8538e1d349403c516a6e0be
-
SSDEEP
393216:QmM+tW4Dd2VzzrZkLJCIUex0y4AtUb9PCfGxdfW6gQzKsL/6gc96yAyqTiSy:Qt+tW4ARd160CCb9PQGq6goPc9KRy
Score8/10-
Checks if the Android device is rooted.
-
Checks known Qemu files.
Checks for known Qemu files that exist on Android virtual device images.
-
Checks known Qemu pipes.
Checks for known pipes used by the Android emulator to communicate with the host.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-