General
-
Target
aa7da091aeedeb6841e58605fe648fe2_JaffaCakes118
-
Size
30.8MB
-
Sample
240614-s5t72s1anp
-
MD5
aa7da091aeedeb6841e58605fe648fe2
-
SHA1
e68b3a05abf7dc96f00f39b044e7f73181a17241
-
SHA256
cdf1cb38cd90729c456daf780420615cd8160145688707e75d3adae41fd4b9ef
-
SHA512
a8d3028a81115f50e7decb54b97e9a4d159fbbe6f2f9c3d52b3d707fcc455514d3172346e6d773e7cea7e0e8202f3ca0e5a634bc251caf6dda927343e0637271
-
SSDEEP
786432:iVY/kvGWk6A7GlFTUb4QU8Tw/sat1+T9+2h2:jkuWEeFTQU8Sz+p+h
Static task
static1
Behavioral task
behavioral1
Sample
aa7da091aeedeb6841e58605fe648fe2_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
Behavioral task
behavioral2
Sample
aa7da091aeedeb6841e58605fe648fe2_JaffaCakes118.apk
Resource
android-x64-arm64-20240611.1-en
Malware Config
Targets
-
-
Target
aa7da091aeedeb6841e58605fe648fe2_JaffaCakes118
-
Size
30.8MB
-
MD5
aa7da091aeedeb6841e58605fe648fe2
-
SHA1
e68b3a05abf7dc96f00f39b044e7f73181a17241
-
SHA256
cdf1cb38cd90729c456daf780420615cd8160145688707e75d3adae41fd4b9ef
-
SHA512
a8d3028a81115f50e7decb54b97e9a4d159fbbe6f2f9c3d52b3d707fcc455514d3172346e6d773e7cea7e0e8202f3ca0e5a634bc251caf6dda927343e0637271
-
SSDEEP
786432:iVY/kvGWk6A7GlFTUb4QU8Tw/sat1+T9+2h2:jkuWEeFTQU8Sz+p+h
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current nearby Wi-Fi networks
Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Reads information about phone network operator.
-
Listens for changes in the sensor environment (might be used to detect emulation)
-