General
-
Target
962b402a6164ad939762d617d41d24e9_JaffaCakes118
-
Size
3.2MB
-
Sample
240604-zdkmvsbc96
-
MD5
962b402a6164ad939762d617d41d24e9
-
SHA1
6829590b2400aa72f932ae7cb61a95f688b4d2ae
-
SHA256
dca22c64471fee28f1ee41674963224c956ae24eb60d737b5a3f8e736be83d70
-
SHA512
56c023a57f82e989b2cb98e0928e2b25b7a6beffb70b39273922a86ae0ba509c30d4bbe7c56964bf978554e9568cb0d4b201c523b9c8ca8b246cdad35412d1c4
-
SSDEEP
98304:F6c3HU0pfAucwQ1uBmVDNxZQoxNr3QDU8d8C:4c7pfjcZugVDfmo4fiC
Static task
static1
Behavioral task
behavioral1
Sample
962b402a6164ad939762d617d41d24e9_JaffaCakes118.apk
Resource
android-x86-arm-20240603-en
Malware Config
Targets
-
-
Target
962b402a6164ad939762d617d41d24e9_JaffaCakes118
-
Size
3.2MB
-
MD5
962b402a6164ad939762d617d41d24e9
-
SHA1
6829590b2400aa72f932ae7cb61a95f688b4d2ae
-
SHA256
dca22c64471fee28f1ee41674963224c956ae24eb60d737b5a3f8e736be83d70
-
SHA512
56c023a57f82e989b2cb98e0928e2b25b7a6beffb70b39273922a86ae0ba509c30d4bbe7c56964bf978554e9568cb0d4b201c523b9c8ca8b246cdad35412d1c4
-
SSDEEP
98304:F6c3HU0pfAucwQ1uBmVDNxZQoxNr3QDU8d8C:4c7pfjcZugVDfmo4fiC
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about active data network
-
Queries the mobile country code (MCC)
-