General
-
Target
97cda20041b882a4c9b3518f48438571_JaffaCakes118
-
Size
2.7MB
-
Sample
240605-lz81pace5t
-
MD5
97cda20041b882a4c9b3518f48438571
-
SHA1
718e686533b4f0b748897e585a1e2a5361c1751e
-
SHA256
3d021165ea4ba0f0b3aaeea94fba87a9db7ad7bcdaab331a0363c70fdbab35fd
-
SHA512
08fcd4fe583cdd836354c243b912fcc3d8fa44f0d9f20c80d2a0f7ebf6af9b757d2ef83a6792078a4576cda32b2e9eddce8169510a2770bbe5f6a576c29a258e
-
SSDEEP
49152:hRZyY3OVLl9fSnpDugpH18yNsBkhXEpp4kN46mvm38EK9IxoEdr1+FiXP9tbBNC/:hRZTKXqnhmyuOUAk6jeMRDEdr8I/9tb4
Static task
static1
Behavioral task
behavioral1
Sample
97cda20041b882a4c9b3518f48438571_JaffaCakes118.apk
Resource
android-x86-arm-20240603-en
Malware Config
Targets
-
-
Target
97cda20041b882a4c9b3518f48438571_JaffaCakes118
-
Size
2.7MB
-
MD5
97cda20041b882a4c9b3518f48438571
-
SHA1
718e686533b4f0b748897e585a1e2a5361c1751e
-
SHA256
3d021165ea4ba0f0b3aaeea94fba87a9db7ad7bcdaab331a0363c70fdbab35fd
-
SHA512
08fcd4fe583cdd836354c243b912fcc3d8fa44f0d9f20c80d2a0f7ebf6af9b757d2ef83a6792078a4576cda32b2e9eddce8169510a2770bbe5f6a576c29a258e
-
SSDEEP
49152:hRZyY3OVLl9fSnpDugpH18yNsBkhXEpp4kN46mvm38EK9IxoEdr1+FiXP9tbBNC/:hRZTKXqnhmyuOUAk6jeMRDEdr8I/9tb4
Score8/10-
Checks if the Android device is rooted.
-
Queries the phone number (MSISDN for GSM devices)
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the mobile country code (MCC)
-
Listens for changes in the sensor environment (might be used to detect emulation)
-