General
-
Target
a1ec349f393e5b600905fa5d0c512421_JaffaCakes118
-
Size
7.4MB
-
Sample
240612-xw68gawfqa
-
MD5
a1ec349f393e5b600905fa5d0c512421
-
SHA1
6834d54b0967e995441ca163f167002f0cd06077
-
SHA256
7d7724c358e480136276f0d09ce84dfa5f434f02665c0917d8f41931b91c7d38
-
SHA512
510a636acaa3b70340c77f07cc050547de3f684da492ae85cc3d6bc4919d4d88d50c889f2568c16aa2ce311b92ded6c25e032d8ab6990fb1e5d837c8c69c4f86
-
SSDEEP
98304:TkaDeBZFTZOJFAn+izpZVc0u6bhlwPICdh:TSZOJFAn+it73hlZC
Static task
static1
Behavioral task
behavioral1
Sample
a1ec349f393e5b600905fa5d0c512421_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
Behavioral task
behavioral2
Sample
a1ec349f393e5b600905fa5d0c512421_JaffaCakes118.apk
Resource
android-x64-20240611.1-en
Behavioral task
behavioral3
Sample
a1ec349f393e5b600905fa5d0c512421_JaffaCakes118.apk
Resource
android-x64-arm64-20240611.1-en
Malware Config
Targets
-
-
Target
a1ec349f393e5b600905fa5d0c512421_JaffaCakes118
-
Size
7.4MB
-
MD5
a1ec349f393e5b600905fa5d0c512421
-
SHA1
6834d54b0967e995441ca163f167002f0cd06077
-
SHA256
7d7724c358e480136276f0d09ce84dfa5f434f02665c0917d8f41931b91c7d38
-
SHA512
510a636acaa3b70340c77f07cc050547de3f684da492ae85cc3d6bc4919d4d88d50c889f2568c16aa2ce311b92ded6c25e032d8ab6990fb1e5d837c8c69c4f86
-
SSDEEP
98304:TkaDeBZFTZOJFAn+izpZVc0u6bhlwPICdh:TSZOJFAn+it73hlZC
Score8/10-
Checks if the Android device is rooted.
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Checks the presence of a debugger
-