General
-
Target
9c46c636c7c8c1bb78f5abd7ee7aa0f4_JaffaCakes118
-
Size
2.6MB
-
Sample
240610-3bg1qsvcmd
-
MD5
9c46c636c7c8c1bb78f5abd7ee7aa0f4
-
SHA1
166728ae1c814d6f1d161f9c6607331760477645
-
SHA256
e830df4a2e4133ca7144fa7b57aef9d56e57a5c5b8a28b17ad5965478771663a
-
SHA512
5f75da82ee7fcd7e84b8c907231785ee2ef3b688e4f4551af782e6e25bf82f25bb01994e38210950369459073da2a320cdfb7d520953cfeb89f16c5fdb526974
-
SSDEEP
49152:giOUYetdQf9M4nYp0qfbmXgAAHY4Cpze+bzxAv0F+VNkIsbhZuZv/eSxEkM:g/Mt+f9M4nYp5zDAaY4Cpa+bzuv0wVNO
Static task
static1
Behavioral task
behavioral1
Sample
9c46c636c7c8c1bb78f5abd7ee7aa0f4_JaffaCakes118.apk
Resource
android-x86-arm-20240603-en
Behavioral task
behavioral2
Sample
9c46c636c7c8c1bb78f5abd7ee7aa0f4_JaffaCakes118.apk
Resource
android-x64-20240603-en
Malware Config
Targets
-
-
Target
9c46c636c7c8c1bb78f5abd7ee7aa0f4_JaffaCakes118
-
Size
2.6MB
-
MD5
9c46c636c7c8c1bb78f5abd7ee7aa0f4
-
SHA1
166728ae1c814d6f1d161f9c6607331760477645
-
SHA256
e830df4a2e4133ca7144fa7b57aef9d56e57a5c5b8a28b17ad5965478771663a
-
SHA512
5f75da82ee7fcd7e84b8c907231785ee2ef3b688e4f4551af782e6e25bf82f25bb01994e38210950369459073da2a320cdfb7d520953cfeb89f16c5fdb526974
-
SSDEEP
49152:giOUYetdQf9M4nYp0qfbmXgAAHY4Cpze+bzxAv0F+VNkIsbhZuZv/eSxEkM:g/Mt+f9M4nYp5zDAaY4Cpa+bzuv0wVNO
-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the unique device ID (IMEI, MEID, IMSI)
-