General
-
Target
8783b07a793ab6bab8282b0a7011d685_JaffaCakes118
-
Size
12.8MB
-
Sample
240531-s4269sde65
-
MD5
8783b07a793ab6bab8282b0a7011d685
-
SHA1
1902c22c1afeb9b75640cd10f94de741b2204356
-
SHA256
b82bf71fef98c96b81844e91271b5a65f7f02b5cbfec06986c534408607f91e1
-
SHA512
3b6ae82e1c64fd7b8a95a072e911a5606586e95a8ff0d7fb42006a848c1d4d9880cd16aef4dda523a7019c3b1e25e85fe8f448a2de702e11a012d14ab80fafe6
-
SSDEEP
393216:0cNEbi6yuS/h9K55NU/UFovWqw+FqxGSw9dZJwq:BE+DuWh9K55y/0nxO9dZJwq
Static task
static1
Behavioral task
behavioral1
Sample
8783b07a793ab6bab8282b0a7011d685_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
8783b07a793ab6bab8282b0a7011d685_JaffaCakes118
-
Size
12.8MB
-
MD5
8783b07a793ab6bab8282b0a7011d685
-
SHA1
1902c22c1afeb9b75640cd10f94de741b2204356
-
SHA256
b82bf71fef98c96b81844e91271b5a65f7f02b5cbfec06986c534408607f91e1
-
SHA512
3b6ae82e1c64fd7b8a95a072e911a5606586e95a8ff0d7fb42006a848c1d4d9880cd16aef4dda523a7019c3b1e25e85fe8f448a2de702e11a012d14ab80fafe6
-
SSDEEP
393216:0cNEbi6yuS/h9K55NU/UFovWqw+FqxGSw9dZJwq:BE+DuWh9K55y/0nxO9dZJwq
Score8/10-
Checks if the Android device is rooted.
-
Checks known Qemu files.
Checks for known Qemu files that exist on Android virtual device images.
-
Checks known Qemu pipes.
Checks for known pipes used by the Android emulator to communicate with the host.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Reads information about phone network operator.
-