General
-
Target
a2c8ebc3542d98d7b25c04f0d1d646cf_JaffaCakes118
-
Size
24.6MB
-
Sample
240612-2sclxaterh
-
MD5
a2c8ebc3542d98d7b25c04f0d1d646cf
-
SHA1
c3d479135dbe680f951810c0c40918b8ca6d51fc
-
SHA256
34e747a69e7ea93dfedebd408d5175a5161e90c3b8f4dae9c00423d8ae811931
-
SHA512
259b58ed45ed0204d5513b34dde43d2d23632a8137b9571ce49da46186b872d2943e802b90114776dfd2fabd97eb4685929ff4f32af25c376128ec5bd9a7ca27
-
SSDEEP
393216:bKKlw2WZpcMv6IBVjppgz3pYOGQRtZwyb9WlxrPeiba6f7PRIavTi4ksSnQ04:bVlw2mzvnjpMmr5DLJba6frhW4ksSnQD
Static task
static1
Behavioral task
behavioral1
Sample
a2c8ebc3542d98d7b25c04f0d1d646cf_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
Behavioral task
behavioral2
Sample
a2c8ebc3542d98d7b25c04f0d1d646cf_JaffaCakes118.apk
Resource
android-x64-20240611.1-en
Malware Config
Targets
-
-
Target
a2c8ebc3542d98d7b25c04f0d1d646cf_JaffaCakes118
-
Size
24.6MB
-
MD5
a2c8ebc3542d98d7b25c04f0d1d646cf
-
SHA1
c3d479135dbe680f951810c0c40918b8ca6d51fc
-
SHA256
34e747a69e7ea93dfedebd408d5175a5161e90c3b8f4dae9c00423d8ae811931
-
SHA512
259b58ed45ed0204d5513b34dde43d2d23632a8137b9571ce49da46186b872d2943e802b90114776dfd2fabd97eb4685929ff4f32af25c376128ec5bd9a7ca27
-
SSDEEP
393216:bKKlw2WZpcMv6IBVjppgz3pYOGQRtZwyb9WlxrPeiba6f7PRIavTi4ksSnQ04:bVlw2mzvnjpMmr5DLJba6frhW4ksSnQD
-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current nearby Wi-Fi networks
Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-