General
-
Target
a804b0b5d7ad2571faf52cf15b3f23db_JaffaCakes118
-
Size
14.8MB
-
Sample
240614-e6w65sygpq
-
MD5
a804b0b5d7ad2571faf52cf15b3f23db
-
SHA1
da180ac24a7323896a4451fd4e86ecec6b89af36
-
SHA256
b98cc355f223d25ac12c9bb565707c476ba352f194ac92f7afffaa721f5dddb5
-
SHA512
0008af90fdf2db4ef227a4209cd2f88894a47df5b9b2f3a1368649790630892538943444cfb8245f152624e4979cf3f1d4ac839aa8e8eb659aaabd68941c5166
-
SSDEEP
393216:cfI0j9mOHU7HmkMKl4Me37+seU0S4iNZw0B7Iy:CH9Y7HmkFpe3yseBYB7/
Static task
static1
Behavioral task
behavioral1
Sample
a804b0b5d7ad2571faf52cf15b3f23db_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
Malware Config
Targets
-
-
Target
a804b0b5d7ad2571faf52cf15b3f23db_JaffaCakes118
-
Size
14.8MB
-
MD5
a804b0b5d7ad2571faf52cf15b3f23db
-
SHA1
da180ac24a7323896a4451fd4e86ecec6b89af36
-
SHA256
b98cc355f223d25ac12c9bb565707c476ba352f194ac92f7afffaa721f5dddb5
-
SHA512
0008af90fdf2db4ef227a4209cd2f88894a47df5b9b2f3a1368649790630892538943444cfb8245f152624e4979cf3f1d4ac839aa8e8eb659aaabd68941c5166
-
SSDEEP
393216:cfI0j9mOHU7HmkMKl4Me37+seU0S4iNZw0B7Iy:CH9Y7HmkFpe3yseBYB7/
Score7/10-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Reads information about phone network operator.
-
Listens for changes in the sensor environment (might be used to detect emulation)
-