General
-
Target
998b76492c7ecbdf827aaeaab3d3bafa_JaffaCakes118
-
Size
7.0MB
-
Sample
240605-3py66sch98
-
MD5
998b76492c7ecbdf827aaeaab3d3bafa
-
SHA1
570dd3d94b640f47e8f00011d100fb5e8b2d07fe
-
SHA256
1eef3126120523d1c710fcc10001c228985853ac13b44c60d52aeb226b7ed838
-
SHA512
d2fbf75244f2f1538d0605a7b119ce36547442fd8824276346b5df21332bb88ff4f080c7f7fb121a6678afd2a07be550afd1fb70b375db83310e7f8150c296f6
-
SSDEEP
98304:rcZS/RgzP3U2LpZ7ipddWe2OQDdgm1ShnNy3QvxfKN+/h1h6R9KonT87zofh5joU:wZKR43U2fupXWe2TexXJrK9KonT8WA3k
Static task
static1
Behavioral task
behavioral1
Sample
998b76492c7ecbdf827aaeaab3d3bafa_JaffaCakes118.apk
Resource
android-x86-arm-20240603-en
Malware Config
Targets
-
-
Target
998b76492c7ecbdf827aaeaab3d3bafa_JaffaCakes118
-
Size
7.0MB
-
MD5
998b76492c7ecbdf827aaeaab3d3bafa
-
SHA1
570dd3d94b640f47e8f00011d100fb5e8b2d07fe
-
SHA256
1eef3126120523d1c710fcc10001c228985853ac13b44c60d52aeb226b7ed838
-
SHA512
d2fbf75244f2f1538d0605a7b119ce36547442fd8824276346b5df21332bb88ff4f080c7f7fb121a6678afd2a07be550afd1fb70b375db83310e7f8150c296f6
-
SSDEEP
98304:rcZS/RgzP3U2LpZ7ipddWe2OQDdgm1ShnNy3QvxfKN+/h1h6R9KonT87zofh5joU:wZKR43U2fupXWe2TexXJrK9KonT8WA3k
Score8/10-
Checks if the Android device is rooted.
-
Checks Android system properties for emulator presence.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about active data network
-
Queries the mobile country code (MCC)
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-