General
-
Target
a33abb76482688eaf6b117f5afa6df65_JaffaCakes118
-
Size
27.5MB
-
Sample
240613-a6ql5s1gkr
-
MD5
a33abb76482688eaf6b117f5afa6df65
-
SHA1
d7637d30ee0c53187bb134a75ca0d719510cc9d2
-
SHA256
5039ba8610977bfa4dee298d248214a5b9af901d88e8025e8e3b691784ce7fac
-
SHA512
f7e1364b8b0236dc3d67d6eb61ab4c5ee71869303a002d6b7b43decb7b13f4f8b8e35c40cc50df4239d0d91903b013b4edcd280045b9a38de79b69e9fe20b483
-
SSDEEP
786432:r9FFqqwNaX0DdfZYH9gIVnmZ3fGeSi0eYkFSDTVu:3FDwNayI9tVnmZ3fGeSbXDBu
Static task
static1
Behavioral task
behavioral1
Sample
a33abb76482688eaf6b117f5afa6df65_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
Behavioral task
behavioral2
Sample
a33abb76482688eaf6b117f5afa6df65_JaffaCakes118.apk
Resource
android-33-x64-arm64-20240611.1-en
Malware Config
Targets
-
-
Target
a33abb76482688eaf6b117f5afa6df65_JaffaCakes118
-
Size
27.5MB
-
MD5
a33abb76482688eaf6b117f5afa6df65
-
SHA1
d7637d30ee0c53187bb134a75ca0d719510cc9d2
-
SHA256
5039ba8610977bfa4dee298d248214a5b9af901d88e8025e8e3b691784ce7fac
-
SHA512
f7e1364b8b0236dc3d67d6eb61ab4c5ee71869303a002d6b7b43decb7b13f4f8b8e35c40cc50df4239d0d91903b013b4edcd280045b9a38de79b69e9fe20b483
-
SSDEEP
786432:r9FFqqwNaX0DdfZYH9gIVnmZ3fGeSi0eYkFSDTVu:3FDwNayI9tVnmZ3fGeSbXDBu
Score7/10-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries the phone number (MSISDN for GSM devices)
-
Acquires the wake lock
-
Queries information about active data network
-
Reads information about phone network operator.
-