General
-
Target
8b15471688e720157826e495f44ade4c_JaffaCakes118
-
Size
14.8MB
-
Sample
240601-t8cmvahe86
-
MD5
8b15471688e720157826e495f44ade4c
-
SHA1
32788c33d8aaed3ffc64341012f19f03dae5d4e4
-
SHA256
18b5367d9ed45ccfc74c5f0484bee4a4fd83fe8c21b3be30c113ebf7f9328a99
-
SHA512
c3bc5da2b2a0a5db5df5b7e28cc7e7346902b701b7d06eafafd9e5b32a226214f4dbf013b78430bbe8a8aae61e2cb4a0885bd87052f0fd3d3176fe5b78f57583
-
SSDEEP
393216:cRZTBxHINvOXc/Mrpla/zETNohXXD5qoPs:67kn/MNqCoh1qo0
Static task
static1
Behavioral task
behavioral1
Sample
8b15471688e720157826e495f44ade4c_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
8b15471688e720157826e495f44ade4c_JaffaCakes118
-
Size
14.8MB
-
MD5
8b15471688e720157826e495f44ade4c
-
SHA1
32788c33d8aaed3ffc64341012f19f03dae5d4e4
-
SHA256
18b5367d9ed45ccfc74c5f0484bee4a4fd83fe8c21b3be30c113ebf7f9328a99
-
SHA512
c3bc5da2b2a0a5db5df5b7e28cc7e7346902b701b7d06eafafd9e5b32a226214f4dbf013b78430bbe8a8aae61e2cb4a0885bd87052f0fd3d3176fe5b78f57583
-
SSDEEP
393216:cRZTBxHINvOXc/Mrpla/zETNohXXD5qoPs:67kn/MNqCoh1qo0
Score8/10-
Checks if the Android device is rooted.
-
Checks Android system properties for emulator presence.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-