General
-
Target
964b4da77b3a56af9d3b8fea61eb9b6e_JaffaCakes118
-
Size
17.6MB
-
Sample
240604-z5zk4abg5v
-
MD5
964b4da77b3a56af9d3b8fea61eb9b6e
-
SHA1
588691b439fd6397d4a6418c9e4381e237dc72b2
-
SHA256
767cec9e560c0c903460b38ca89c1b1e731e6c87c82ef941faef3e4218fb7c5e
-
SHA512
0a30bec68f6800562869b9721ef11a2f2ad5ca0713ca17e09b5f48a767ca8c782c4162a3872c4b8506508272673e6cf41fd7f78c2b9ec41212f69181d2c31a5b
-
SSDEEP
393216:AQB5T3XE/xR4KdqermbZzvbVBfUgXkwnNr7Om3:AQBx3XE/x5dqVjxP7Om3
Static task
static1
Behavioral task
behavioral1
Sample
964b4da77b3a56af9d3b8fea61eb9b6e_JaffaCakes118.apk
Resource
android-x86-arm-20240603-en
Malware Config
Targets
-
-
Target
964b4da77b3a56af9d3b8fea61eb9b6e_JaffaCakes118
-
Size
17.6MB
-
MD5
964b4da77b3a56af9d3b8fea61eb9b6e
-
SHA1
588691b439fd6397d4a6418c9e4381e237dc72b2
-
SHA256
767cec9e560c0c903460b38ca89c1b1e731e6c87c82ef941faef3e4218fb7c5e
-
SHA512
0a30bec68f6800562869b9721ef11a2f2ad5ca0713ca17e09b5f48a767ca8c782c4162a3872c4b8506508272673e6cf41fd7f78c2b9ec41212f69181d2c31a5b
-
SSDEEP
393216:AQB5T3XE/xR4KdqermbZzvbVBfUgXkwnNr7Om3:AQBx3XE/x5dqVjxP7Om3
Score8/10-
Checks if the Android device is rooted.
-
Checks Android system properties for emulator presence.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Reads information about phone network operator.
-