General
-
Target
b0a418ce4f5439ddcb9c864e5ffd45a4_JaffaCakes118
-
Size
7.8MB
-
Sample
240615-3b7ldsshkq
-
MD5
b0a418ce4f5439ddcb9c864e5ffd45a4
-
SHA1
c193efe7fddffc9ec3db481ee179f55723c9c82c
-
SHA256
449a67e03e05e2035b33fd253bee3f8bcf9c54c85e2bfde571e7e5d44ae485bb
-
SHA512
39fd4aee81c8fd89b465c5d6d904af11bd1e730c7afef6f781e0fe3e4c5047af03ae98329b4541671f5b49d230d958270bc217b909e529c0aee3157018472500
-
SSDEEP
98304:ho8sr3DIVnWwCBZUcJbzpWrW4ShYSDUBbo4CFDv/3IOcVx9DUzOpHw0DCq1di466:hmv7prh9DubcqVoyt6q+46rPW
Behavioral task
behavioral1
Sample
b0a418ce4f5439ddcb9c864e5ffd45a4_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
Behavioral task
behavioral2
Sample
b0a418ce4f5439ddcb9c864e5ffd45a4_JaffaCakes118.apk
Resource
android-x64-20240611.1-en
Malware Config
Targets
-
-
Target
b0a418ce4f5439ddcb9c864e5ffd45a4_JaffaCakes118
-
Size
7.8MB
-
MD5
b0a418ce4f5439ddcb9c864e5ffd45a4
-
SHA1
c193efe7fddffc9ec3db481ee179f55723c9c82c
-
SHA256
449a67e03e05e2035b33fd253bee3f8bcf9c54c85e2bfde571e7e5d44ae485bb
-
SHA512
39fd4aee81c8fd89b465c5d6d904af11bd1e730c7afef6f781e0fe3e4c5047af03ae98329b4541671f5b49d230d958270bc217b909e529c0aee3157018472500
-
SSDEEP
98304:ho8sr3DIVnWwCBZUcJbzpWrW4ShYSDUBbo4CFDv/3IOcVx9DUzOpHw0DCq1di466:hmv7prh9DubcqVoyt6q+46rPW
Score7/10-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Acquires the wake lock
-
Queries information about active data network
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-