General
-
Target
984924f7f74e34e00a2ab14e2b37e868_JaffaCakes118
-
Size
3.4MB
-
Sample
240605-qvlrtahe57
-
MD5
984924f7f74e34e00a2ab14e2b37e868
-
SHA1
9f7b9eecafb014fc63dc90865422f5e7f90dc507
-
SHA256
9a8a19eb6b18a1aa018a8173d00f46c3ac69d053d928ac7c2cf8dd875d179432
-
SHA512
e218709533ed1ea9fe63f96527a3fcb8773e837cf5c502ddb1d20f5716945a3dbc7b5bbaddcd490590206162cf9550208fdd0c050779592e3b2e273b6f29af0a
-
SSDEEP
98304:dQm7rcPjG6bIb6Ya3WHcygI1Q4ZBkPRx4:dQsYi6bXk8xIYr4
Static task
static1
Behavioral task
behavioral1
Sample
984924f7f74e34e00a2ab14e2b37e868_JaffaCakes118.apk
Resource
android-x86-arm-20240603-en
Behavioral task
behavioral2
Sample
984924f7f74e34e00a2ab14e2b37e868_JaffaCakes118.apk
Resource
android-x64-20240603-en
Behavioral task
behavioral3
Sample
984924f7f74e34e00a2ab14e2b37e868_JaffaCakes118.apk
Resource
android-x64-arm64-20240603-en
Malware Config
Targets
-
-
Target
984924f7f74e34e00a2ab14e2b37e868_JaffaCakes118
-
Size
3.4MB
-
MD5
984924f7f74e34e00a2ab14e2b37e868
-
SHA1
9f7b9eecafb014fc63dc90865422f5e7f90dc507
-
SHA256
9a8a19eb6b18a1aa018a8173d00f46c3ac69d053d928ac7c2cf8dd875d179432
-
SHA512
e218709533ed1ea9fe63f96527a3fcb8773e837cf5c502ddb1d20f5716945a3dbc7b5bbaddcd490590206162cf9550208fdd0c050779592e3b2e273b6f29af0a
-
SSDEEP
98304:dQm7rcPjG6bIb6Ya3WHcygI1Q4ZBkPRx4:dQsYi6bXk8xIYr4
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-