General
-
Target
a360edd5a1318b806add45ef0cb37f3c_JaffaCakes118
-
Size
12.3MB
-
Sample
240613-byy4zszalf
-
MD5
a360edd5a1318b806add45ef0cb37f3c
-
SHA1
27e9e87f328ec69b235051ad0838b8670150b928
-
SHA256
cb3a67388ae6476faf310d06c51f9fdc52ad271e1f7d7456cefba214520646d5
-
SHA512
983c00a588c2cf090a9edf6a59b7dfb6c249228335686b504e3fa438a2bd77ac493b16795119baea750da720fc003019ad7bc607dde75a317ab990e7885d7001
-
SSDEEP
393216:rpScWNBolLCGnClmiIoYGnsPDVnOZPM4Ke/zadSIkFJ:rgnaW7CDqPMa/zadU
Static task
static1
Behavioral task
behavioral1
Sample
a360edd5a1318b806add45ef0cb37f3c_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
Behavioral task
behavioral2
Sample
a360edd5a1318b806add45ef0cb37f3c_JaffaCakes118.apk
Resource
android-x64-20240611.1-en
Malware Config
Targets
-
-
Target
a360edd5a1318b806add45ef0cb37f3c_JaffaCakes118
-
Size
12.3MB
-
MD5
a360edd5a1318b806add45ef0cb37f3c
-
SHA1
27e9e87f328ec69b235051ad0838b8670150b928
-
SHA256
cb3a67388ae6476faf310d06c51f9fdc52ad271e1f7d7456cefba214520646d5
-
SHA512
983c00a588c2cf090a9edf6a59b7dfb6c249228335686b504e3fa438a2bd77ac493b16795119baea750da720fc003019ad7bc607dde75a317ab990e7885d7001
-
SSDEEP
393216:rpScWNBolLCGnClmiIoYGnsPDVnOZPM4Ke/zadSIkFJ:rgnaW7CDqPMa/zadU
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the unique device ID (IMEI, MEID, IMSI)
-