General
-
Target
a9dd26362beada43a81d8af37f0f30f6_JaffaCakes118
-
Size
19.8MB
-
Sample
240614-qh2x9ssclb
-
MD5
a9dd26362beada43a81d8af37f0f30f6
-
SHA1
e75269d171a1062c51e37d274af2a560dc98358a
-
SHA256
d09db83857c16a232c6a9d560e02f7696f29be344ce97622427b3241ce3fea40
-
SHA512
ac2dce1b578f017b840fd33cd88730ecdb392e066ca4e20c14b545c277820d9b85d99d29f0a43e5004c85183770e85ee4dba4e22f75d2a58dd0d432ead0f1660
-
SSDEEP
393216:ubyTbIbWLcRkSXfvNw3AvF1PM4X+8n9rdIOt+4anCJD7YCmjF:vbiNSSXfvmK3VX+89Gf4anCJajF
Static task
static1
Behavioral task
behavioral1
Sample
a9dd26362beada43a81d8af37f0f30f6_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
Malware Config
Targets
-
-
Target
a9dd26362beada43a81d8af37f0f30f6_JaffaCakes118
-
Size
19.8MB
-
MD5
a9dd26362beada43a81d8af37f0f30f6
-
SHA1
e75269d171a1062c51e37d274af2a560dc98358a
-
SHA256
d09db83857c16a232c6a9d560e02f7696f29be344ce97622427b3241ce3fea40
-
SHA512
ac2dce1b578f017b840fd33cd88730ecdb392e066ca4e20c14b545c277820d9b85d99d29f0a43e5004c85183770e85ee4dba4e22f75d2a58dd0d432ead0f1660
-
SSDEEP
393216:ubyTbIbWLcRkSXfvNw3AvF1PM4X+8n9rdIOt+4anCJD7YCmjF:vbiNSSXfvmK3VX+89Gf4anCJajF
-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about active data network
-
Queries the mobile country code (MCC)
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-