General
-
Target
877a2f7c38905dc5eb0188a49607a0cd_JaffaCakes118
-
Size
28.3MB
-
Sample
240531-sv18lsce51
-
MD5
877a2f7c38905dc5eb0188a49607a0cd
-
SHA1
4aaec0a2ab768a3b3abd2ae01f77b61d2d7623ae
-
SHA256
061e5e2644778461921dcb30296cb6daef5055c69bea9017610649238279c32a
-
SHA512
b370e2c555c8ddda67033995b9febb9de98aa7038d67f76610a5552095780a336ac8e33046591738f01f536b64fdd1e72c17e371a5d3647d12c1688792c83444
-
SSDEEP
786432:s21bZ0rHTJzbG0Nm2V8Rr1B7BJjD7j3IUazxi9K0rUPLvnAlY:B1bZ4HRaG2rb7TKL0r2LJ
Static task
static1
Behavioral task
behavioral1
Sample
877a2f7c38905dc5eb0188a49607a0cd_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
877a2f7c38905dc5eb0188a49607a0cd_JaffaCakes118
-
Size
28.3MB
-
MD5
877a2f7c38905dc5eb0188a49607a0cd
-
SHA1
4aaec0a2ab768a3b3abd2ae01f77b61d2d7623ae
-
SHA256
061e5e2644778461921dcb30296cb6daef5055c69bea9017610649238279c32a
-
SHA512
b370e2c555c8ddda67033995b9febb9de98aa7038d67f76610a5552095780a336ac8e33046591738f01f536b64fdd1e72c17e371a5d3647d12c1688792c83444
-
SSDEEP
786432:s21bZ0rHTJzbG0Nm2V8Rr1B7BJjD7j3IUazxi9K0rUPLvnAlY:B1bZ4HRaG2rb7TKL0r2LJ
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Acquires the wake lock
-
Checks if the internet connection is available
-
Reads information about phone network operator.
-
Checks the presence of a debugger
-