General
-
Target
a441e148c81d95e204a15fa91e790029_JaffaCakes118
-
Size
19.7MB
-
Sample
240613-hg4rgasbmq
-
MD5
a441e148c81d95e204a15fa91e790029
-
SHA1
86f31bb4f96156113a1127956ec5b90fc53b6d74
-
SHA256
bf33af38148ab44578ee5d99f75dbc0d7b47dedbae6cf798c6a58347196e8ae9
-
SHA512
e0ffee8abc5e21b8cec1756737ad1a11d0c00cc8071eda139ac8d87c5e68d3368c7c917b2c5dd17b19620921851b4b00ac1ce960f6eb6ace068afdba880da5b8
-
SSDEEP
393216:ZRTVPtAfregyJV2UIhRw+u9QV8UHVcTWOG6l5LXjl4JzlVGRAMDdDUP2Pj:ZlVPWegaVl4yJ9QOjKOrDqxkVDdNPj
Static task
static1
Behavioral task
behavioral1
Sample
a441e148c81d95e204a15fa91e790029_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
Malware Config
Targets
-
-
Target
a441e148c81d95e204a15fa91e790029_JaffaCakes118
-
Size
19.7MB
-
MD5
a441e148c81d95e204a15fa91e790029
-
SHA1
86f31bb4f96156113a1127956ec5b90fc53b6d74
-
SHA256
bf33af38148ab44578ee5d99f75dbc0d7b47dedbae6cf798c6a58347196e8ae9
-
SHA512
e0ffee8abc5e21b8cec1756737ad1a11d0c00cc8071eda139ac8d87c5e68d3368c7c917b2c5dd17b19620921851b4b00ac1ce960f6eb6ace068afdba880da5b8
-
SSDEEP
393216:ZRTVPtAfregyJV2UIhRw+u9QV8UHVcTWOG6l5LXjl4JzlVGRAMDdDUP2Pj:ZlVPWegaVl4yJ9QOjKOrDqxkVDdNPj
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Acquires the wake lock
-