General
-
Target
a7cb2974fde9d0bd33f1192698e983b5_JaffaCakes118
-
Size
30.9MB
-
Sample
240614-dkqlssshke
-
MD5
a7cb2974fde9d0bd33f1192698e983b5
-
SHA1
9a9b43fcbc3028b91dc0fa1d15d6662ccf70426d
-
SHA256
164b1101bfeeba4be6c6ef70b0999f5850374cab220ca3e663a6bfe07d6b86d2
-
SHA512
71667682e6a817b3a179452ab62fc21f017ecf6e6cdf384b0c026e50eaddd0916f9a3a529dc733b8bb3b95f84fe7a5390329bfef9d1b114dc64d8d33f50e7105
-
SSDEEP
786432:7kGw70jugoVgNN9v/sQbtvsk1nXZ2fVKMwCTEz1EtDO7Yxj:7lw70igoVk0Jkn29KME1E+Mj
Static task
static1
Behavioral task
behavioral1
Sample
a7cb2974fde9d0bd33f1192698e983b5_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
Malware Config
Targets
-
-
Target
a7cb2974fde9d0bd33f1192698e983b5_JaffaCakes118
-
Size
30.9MB
-
MD5
a7cb2974fde9d0bd33f1192698e983b5
-
SHA1
9a9b43fcbc3028b91dc0fa1d15d6662ccf70426d
-
SHA256
164b1101bfeeba4be6c6ef70b0999f5850374cab220ca3e663a6bfe07d6b86d2
-
SHA512
71667682e6a817b3a179452ab62fc21f017ecf6e6cdf384b0c026e50eaddd0916f9a3a529dc733b8bb3b95f84fe7a5390329bfef9d1b114dc64d8d33f50e7105
-
SSDEEP
786432:7kGw70jugoVgNN9v/sQbtvsk1nXZ2fVKMwCTEz1EtDO7Yxj:7lw70igoVk0Jkn29KME1E+Mj
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Acquires the wake lock
-
Queries information about active data network
-
Queries the mobile country code (MCC)
-
Reads information about phone network operator.
-