General
-
Target
a7eb06a589f09380dbf42e5dbea0698d_JaffaCakes118
-
Size
14.8MB
-
Sample
240614-ef52csthlb
-
MD5
a7eb06a589f09380dbf42e5dbea0698d
-
SHA1
07b7f880a96d7af9662fd53e67cb5b3e53799e2f
-
SHA256
916c8c70c91f4106ea10e1034d10a0500577fd1698c6be593b64e5456b19dfc7
-
SHA512
c1bbb22c43ce836c7ffcd33beb660b61e2e0f6a5982f63e24ffdb4f721e4547ea65648e3b9c15400559b1fd25693cf4460236a7fdfaeb6e8d9a1ca7d1a1b2ffd
-
SSDEEP
393216:qlCliDM5u+67zs6PrGATRKXDg3H3EtZ6fg1FQl50VVS3d:qkliDMg3/xcDg3X4ZQg1FQH07+
Static task
static1
Malware Config
Targets
-
-
Target
a7eb06a589f09380dbf42e5dbea0698d_JaffaCakes118
-
Size
14.8MB
-
MD5
a7eb06a589f09380dbf42e5dbea0698d
-
SHA1
07b7f880a96d7af9662fd53e67cb5b3e53799e2f
-
SHA256
916c8c70c91f4106ea10e1034d10a0500577fd1698c6be593b64e5456b19dfc7
-
SHA512
c1bbb22c43ce836c7ffcd33beb660b61e2e0f6a5982f63e24ffdb4f721e4547ea65648e3b9c15400559b1fd25693cf4460236a7fdfaeb6e8d9a1ca7d1a1b2ffd
-
SSDEEP
393216:qlCliDM5u+67zs6PrGATRKXDg3H3EtZ6fg1FQl50VVS3d:qkliDMg3/xcDg3X4ZQg1FQH07+
-
Checks Android system properties for emulator presence.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-