General
-
Target
8ee63ba05fda0246bdecee4329729ad7_JaffaCakes118
-
Size
26.5MB
-
Sample
240602-wbp8saag36
-
MD5
8ee63ba05fda0246bdecee4329729ad7
-
SHA1
ec0ca530c933b08258f0f07d22e204fb0bbe0e9e
-
SHA256
a0e184a84e614302b68c3a3f111fe7b7d86151724d7810433999684dd489844b
-
SHA512
3daddba06ccb98e63991cd67de6053074b697d91f112acf3e33de8561db811d1e3d838ae288009816e00fd39e9b896a4be36972b14f1c9bcf809189b505f0f3b
-
SSDEEP
786432:28MlpG3RXn4XEdXDRCvCFRbCfS+ozw20lR4:28ipKR34KFCvCFR823
Static task
static1
Behavioral task
behavioral1
Sample
8ee63ba05fda0246bdecee4329729ad7_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
8ee63ba05fda0246bdecee4329729ad7_JaffaCakes118
-
Size
26.5MB
-
MD5
8ee63ba05fda0246bdecee4329729ad7
-
SHA1
ec0ca530c933b08258f0f07d22e204fb0bbe0e9e
-
SHA256
a0e184a84e614302b68c3a3f111fe7b7d86151724d7810433999684dd489844b
-
SHA512
3daddba06ccb98e63991cd67de6053074b697d91f112acf3e33de8561db811d1e3d838ae288009816e00fd39e9b896a4be36972b14f1c9bcf809189b505f0f3b
-
SSDEEP
786432:28MlpG3RXn4XEdXDRCvCFRbCfS+ozw20lR4:28ipKR34KFCvCFR823
Score8/10-
Checks if the Android device is rooted.
-
Checks Android system properties for emulator presence.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Acquires the wake lock
-
Checks if the internet connection is available
-
Reads information about phone network operator.
-
Listens for changes in the sensor environment (might be used to detect emulation)
-