General
-
Target
9a887bb63bbc4f7cbb48212e4e13693d_JaffaCakes118
-
Size
3.4MB
-
Sample
240610-nr36ksaa28
-
MD5
9a887bb63bbc4f7cbb48212e4e13693d
-
SHA1
9cf5680aed08fb352066180b423260fba7d02ab5
-
SHA256
e588fc7c2c91448bfa9969bd01838295bd26041c0756d3048c38b1c95bf8e6ab
-
SHA512
85dca3e5fa9a1eea74108f9932a5d638d894330e8e14108dfe422034ceefbac5175c4f09858d2769e801e0aef2c7f8f71d456448206e425eb6aed2078961752e
-
SSDEEP
98304:9nbwpw2KMyNW2kEA+sBzh/pYJG0mU0I/OZmSFj:9nUZhuvpvOnFj
Static task
static1
Behavioral task
behavioral1
Sample
9a887bb63bbc4f7cbb48212e4e13693d_JaffaCakes118.apk
Resource
android-x86-arm-20240603-en
Behavioral task
behavioral2
Sample
9a887bb63bbc4f7cbb48212e4e13693d_JaffaCakes118.apk
Resource
android-x64-20240603-en
Behavioral task
behavioral3
Sample
9a887bb63bbc4f7cbb48212e4e13693d_JaffaCakes118.apk
Resource
android-x64-arm64-20240603-en
Malware Config
Targets
-
-
Target
9a887bb63bbc4f7cbb48212e4e13693d_JaffaCakes118
-
Size
3.4MB
-
MD5
9a887bb63bbc4f7cbb48212e4e13693d
-
SHA1
9cf5680aed08fb352066180b423260fba7d02ab5
-
SHA256
e588fc7c2c91448bfa9969bd01838295bd26041c0756d3048c38b1c95bf8e6ab
-
SHA512
85dca3e5fa9a1eea74108f9932a5d638d894330e8e14108dfe422034ceefbac5175c4f09858d2769e801e0aef2c7f8f71d456448206e425eb6aed2078961752e
-
SSDEEP
98304:9nbwpw2KMyNW2kEA+sBzh/pYJG0mU0I/OZmSFj:9nUZhuvpvOnFj
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-