General
-
Target
a7767d5a4c63a23afc005ebc5eaddb64_JaffaCakes118
-
Size
4.5MB
-
Sample
240614-bg5kfasfrm
-
MD5
a7767d5a4c63a23afc005ebc5eaddb64
-
SHA1
ffbb21dc23c7d63dc0ce04e4673a92175ecf545c
-
SHA256
dbf24574895a7e6c3d79d64e6a2e8c0f01b55d93b0685f072e064371a848ad8b
-
SHA512
11998f24e46c8e7f8b8b3760f1c382c48987c83d7096027e2155e25577400534294a3a838e3797c376f0fe2438d5373cb75030dbf34f353ef3ac69f0f50983a7
-
SSDEEP
98304:ceFtCRitlpFuRQ6Eh1VSbKJ1hxkwPwblZY+Ikea2Eit66gwOAWcvEWDuqfdfTFw:3mRitEW5bBJzMY5knYNW91
Static task
static1
Behavioral task
behavioral1
Sample
a7767d5a4c63a23afc005ebc5eaddb64_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
Malware Config
Targets
-
-
Target
a7767d5a4c63a23afc005ebc5eaddb64_JaffaCakes118
-
Size
4.5MB
-
MD5
a7767d5a4c63a23afc005ebc5eaddb64
-
SHA1
ffbb21dc23c7d63dc0ce04e4673a92175ecf545c
-
SHA256
dbf24574895a7e6c3d79d64e6a2e8c0f01b55d93b0685f072e064371a848ad8b
-
SHA512
11998f24e46c8e7f8b8b3760f1c382c48987c83d7096027e2155e25577400534294a3a838e3797c376f0fe2438d5373cb75030dbf34f353ef3ac69f0f50983a7
-
SSDEEP
98304:ceFtCRitlpFuRQ6Eh1VSbKJ1hxkwPwblZY+Ikea2Eit66gwOAWcvEWDuqfdfTFw:3mRitEW5bBJzMY5knYNW91
Score8/10-
Checks if the Android device is rooted.
-
Checks known Qemu pipes.
Checks for known pipes used by the Android emulator to communicate with the host.
-
Acquires the wake lock
-
Queries information about active data network
-
Reads information about phone network operator.
-