General
-
Target
95490942b1eac0c3fdaeddaa12f87847_JaffaCakes118
-
Size
5.9MB
-
Sample
240604-seckbabe63
-
MD5
95490942b1eac0c3fdaeddaa12f87847
-
SHA1
f0af63179dc736df5ef92119255a36fd0b8a3044
-
SHA256
744d06ef1fcf8025aebf5590ad99d106ce1cca13e504ee82407d37f6b8622288
-
SHA512
3f319f1e69f6475b2e47fab8505a866b34abe3f9d6e558738877f07c69d1cafb876c6ded223d3c541b44bc13441619d9f8d016b8f7524f4dd49c0b5264bd261a
-
SSDEEP
98304:XHQljvUKULoYgMmTRavh0nsudJ6VMyq0QBa9uqArf0iLhZ601mT6PPO:XHQlDU8dcKPMU0QQgz/6003
Static task
static1
Behavioral task
behavioral1
Sample
95490942b1eac0c3fdaeddaa12f87847_JaffaCakes118.apk
Resource
android-x86-arm-20240603-en
Behavioral task
behavioral2
Sample
95490942b1eac0c3fdaeddaa12f87847_JaffaCakes118.apk
Resource
android-x64-20240603-en
Behavioral task
behavioral3
Sample
95490942b1eac0c3fdaeddaa12f87847_JaffaCakes118.apk
Resource
android-x64-arm64-20240603-en
Malware Config
Targets
-
-
Target
95490942b1eac0c3fdaeddaa12f87847_JaffaCakes118
-
Size
5.9MB
-
MD5
95490942b1eac0c3fdaeddaa12f87847
-
SHA1
f0af63179dc736df5ef92119255a36fd0b8a3044
-
SHA256
744d06ef1fcf8025aebf5590ad99d106ce1cca13e504ee82407d37f6b8622288
-
SHA512
3f319f1e69f6475b2e47fab8505a866b34abe3f9d6e558738877f07c69d1cafb876c6ded223d3c541b44bc13441619d9f8d016b8f7524f4dd49c0b5264bd261a
-
SSDEEP
98304:XHQljvUKULoYgMmTRavh0nsudJ6VMyq0QBa9uqArf0iLhZ601mT6PPO:XHQlDU8dcKPMU0QQgz/6003
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-