General
-
Target
9baaae918e82603fd5959160e52819db_JaffaCakes118
-
Size
8.6MB
-
Sample
240610-xmpl3awgpd
-
MD5
9baaae918e82603fd5959160e52819db
-
SHA1
47bb48bedaa1e0e87077e372c9158cee837b6960
-
SHA256
1f39b166ec09678b62a0c5f8e17b62d2fc4a9db4ff9d2038f2e0ca1f68c6cf18
-
SHA512
1bc8fe06536b0188f323f33d191bc3160ffea30fd6569f49b10e810712a938f3c8f5007bb8f3a10b441e2766a35bb0d06351d1e975f19f58e689945fe691cc7b
-
SSDEEP
196608:c0LG6dmKIhPXy6E7le/qyTVpmgbxzU4j8MB+QxVs1Temuej:c6G6AhPXLExeLTWgbx3BVBO
Static task
static1
Behavioral task
behavioral1
Sample
9baaae918e82603fd5959160e52819db_JaffaCakes118.apk
Resource
android-x86-arm-20240603-en
Behavioral task
behavioral2
Sample
9baaae918e82603fd5959160e52819db_JaffaCakes118.apk
Resource
android-x64-20240603-en
Malware Config
Targets
-
-
Target
9baaae918e82603fd5959160e52819db_JaffaCakes118
-
Size
8.6MB
-
MD5
9baaae918e82603fd5959160e52819db
-
SHA1
47bb48bedaa1e0e87077e372c9158cee837b6960
-
SHA256
1f39b166ec09678b62a0c5f8e17b62d2fc4a9db4ff9d2038f2e0ca1f68c6cf18
-
SHA512
1bc8fe06536b0188f323f33d191bc3160ffea30fd6569f49b10e810712a938f3c8f5007bb8f3a10b441e2766a35bb0d06351d1e975f19f58e689945fe691cc7b
-
SSDEEP
196608:c0LG6dmKIhPXy6E7le/qyTVpmgbxzU4j8MB+QxVs1Temuej:c6G6AhPXLExeLTWgbx3BVBO
Score7/10-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-