General
-
Target
84554324900cd460782ec7729eabc842_JaffaCakes118
-
Size
30.3MB
-
Sample
240530-qvmzwaac8x
-
MD5
84554324900cd460782ec7729eabc842
-
SHA1
515524b266a9b5ac99c764da9b50ed1d1a3c7eb2
-
SHA256
6bdf730501010cb2fa4fd07f20ac42a49096f9d0a55cd83af4c89bb5270c0bdd
-
SHA512
4abc1a2b756501ca5acee5d8a51fa85d3594107cdac525b85c7348764cb1aa36db1d9e00623b683c81d6f8b2dd087b04d1583b4885cc1061a446627d7ff978ce
-
SSDEEP
786432:R8Ig17IC7PmIMryqp2jZPYpsEAQvA9C0/smCQzREet:w1sC7PmH52VPYpsJ+A9X/ssn
Static task
static1
Behavioral task
behavioral1
Sample
84554324900cd460782ec7729eabc842_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
84554324900cd460782ec7729eabc842_JaffaCakes118
-
Size
30.3MB
-
MD5
84554324900cd460782ec7729eabc842
-
SHA1
515524b266a9b5ac99c764da9b50ed1d1a3c7eb2
-
SHA256
6bdf730501010cb2fa4fd07f20ac42a49096f9d0a55cd83af4c89bb5270c0bdd
-
SHA512
4abc1a2b756501ca5acee5d8a51fa85d3594107cdac525b85c7348764cb1aa36db1d9e00623b683c81d6f8b2dd087b04d1583b4885cc1061a446627d7ff978ce
-
SSDEEP
786432:R8Ig17IC7PmIMryqp2jZPYpsEAQvA9C0/smCQzREet:w1sC7PmH52VPYpsJ+A9X/ssn
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Reads information about phone network operator.
-
Schedules tasks to execute at a specified time
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
-