General
-
Target
a9e039643a685fae0b5acf93d2eb9396_JaffaCakes118
-
Size
9.8MB
-
Sample
240614-thb9dsxena
-
MD5
a9e039643a685fae0b5acf93d2eb9396
-
SHA1
b471bca4adec36a2c66d1f27e298cccb910a828c
-
SHA256
3049525acfd4b5bb9935392923aa71c21aa77fd271029b1b298470da12c7ad6f
-
SHA512
55a8b6068a5b7444edf5e40d1a5911f245f07d8c966916ac8450d0d00f9b1254ccdf0cd0ecc908922a90a54e1824c3bbdc451b6c2d0679aee4207e7712d6ccce
-
SSDEEP
196608:zPUozgEEDZppYD8rZaaukyOykB1yWj/1pxvwUn6bJzsNaB/9izzknbbg:r9zgHDtZazVU1pxvAbpxB1bbg
Static task
static1
Behavioral task
behavioral1
Sample
a9e039643a685fae0b5acf93d2eb9396_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
Malware Config
Targets
-
-
Target
a9e039643a685fae0b5acf93d2eb9396_JaffaCakes118
-
Size
9.8MB
-
MD5
a9e039643a685fae0b5acf93d2eb9396
-
SHA1
b471bca4adec36a2c66d1f27e298cccb910a828c
-
SHA256
3049525acfd4b5bb9935392923aa71c21aa77fd271029b1b298470da12c7ad6f
-
SHA512
55a8b6068a5b7444edf5e40d1a5911f245f07d8c966916ac8450d0d00f9b1254ccdf0cd0ecc908922a90a54e1824c3bbdc451b6c2d0679aee4207e7712d6ccce
-
SSDEEP
196608:zPUozgEEDZppYD8rZaaukyOykB1yWj/1pxvwUn6bJzsNaB/9izzknbbg:r9zgHDtZazVU1pxvAbpxB1bbg
Score7/10-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the mobile country code (MCC)
-
Listens for changes in the sensor environment (might be used to detect emulation)
-