General
-
Target
a7be06bb1eba10dbc966a9520df54f49_JaffaCakes118
-
Size
17.9MB
-
Sample
240614-c6c26awdmr
-
MD5
a7be06bb1eba10dbc966a9520df54f49
-
SHA1
b2e03cd31620794be16b16c22be5aa08a8204eea
-
SHA256
724ef3e2314ce8f12cff0a520c39cec0082b19e080f2429be43bc595a440c23c
-
SHA512
060401825fd868066b2b5c20a4cb3168b7812e61ac55688d22d5e538b73309cb21b7415bf9f38037f91e457a2e810179a0b08935cacb353bcc2ea2b0820b08f1
-
SSDEEP
393216:Z6jAdZ5D9opbZBIPerHcV+r2tF9YC307gf/dgXRJX94y:Z6jAdXDAZBIPeryF9/Ec2XzXKy
Static task
static1
Behavioral task
behavioral1
Sample
a7be06bb1eba10dbc966a9520df54f49_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
Malware Config
Targets
-
-
Target
a7be06bb1eba10dbc966a9520df54f49_JaffaCakes118
-
Size
17.9MB
-
MD5
a7be06bb1eba10dbc966a9520df54f49
-
SHA1
b2e03cd31620794be16b16c22be5aa08a8204eea
-
SHA256
724ef3e2314ce8f12cff0a520c39cec0082b19e080f2429be43bc595a440c23c
-
SHA512
060401825fd868066b2b5c20a4cb3168b7812e61ac55688d22d5e538b73309cb21b7415bf9f38037f91e457a2e810179a0b08935cacb353bcc2ea2b0820b08f1
-
SSDEEP
393216:Z6jAdZ5D9opbZBIPerHcV+r2tF9YC307gf/dgXRJX94y:Z6jAdXDAZBIPeryF9/Ec2XzXKy
Score7/10-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Reads information about phone network operator.
-