General
-
Target
a41874ee4e52c7b2c0549b727a0a8c67_JaffaCakes118
-
Size
21.2MB
-
Sample
240613-gpc32swgmf
-
MD5
a41874ee4e52c7b2c0549b727a0a8c67
-
SHA1
689a7fcae27df1a9719bc55d7aa695a3e17db0df
-
SHA256
249476baa3055e6eacaf200557d3e856c8d3224c62757ef4525c51c74b93b1ba
-
SHA512
f935e83e3eb8846d71783c620dd3e61c7b57b93f1b4e9e22c5d112cec5c6d3d6c7257c9f741d8215850cc63eb2d896676a331a25610e5c8b82420ec80eea8258
-
SSDEEP
393216:LI0G4AgooJlYeJkh7YUNmck8Bvlt7B6SOkZ/Uq9aX1GzRowT9YgBXzmny8i6MG+e:LuGoo4h/Ic1tt7B6EdY1NIjmmGVBy53w
Static task
static1
Behavioral task
behavioral1
Sample
a41874ee4e52c7b2c0549b727a0a8c67_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
Malware Config
Targets
-
-
Target
a41874ee4e52c7b2c0549b727a0a8c67_JaffaCakes118
-
Size
21.2MB
-
MD5
a41874ee4e52c7b2c0549b727a0a8c67
-
SHA1
689a7fcae27df1a9719bc55d7aa695a3e17db0df
-
SHA256
249476baa3055e6eacaf200557d3e856c8d3224c62757ef4525c51c74b93b1ba
-
SHA512
f935e83e3eb8846d71783c620dd3e61c7b57b93f1b4e9e22c5d112cec5c6d3d6c7257c9f741d8215850cc63eb2d896676a331a25610e5c8b82420ec80eea8258
-
SSDEEP
393216:LI0G4AgooJlYeJkh7YUNmck8Bvlt7B6SOkZ/Uq9aX1GzRowT9YgBXzmny8i6MG+e:LuGoo4h/Ic1tt7B6EdY1NIjmmGVBy53w
Score8/10-
Checks if the Android device is rooted.
-
Checks Android system properties for emulator presence.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about active data network
-
Queries the mobile country code (MCC)
-