General
-
Target
b549eac8b39cd580ba7c8d597bc5efb3_JaffaCakes118
-
Size
11.1MB
-
Sample
240616-1axzfssgjl
-
MD5
b549eac8b39cd580ba7c8d597bc5efb3
-
SHA1
34c40a2e6a3137b1c0eb6d47c86be50f1859a97b
-
SHA256
9c9e78c04c1bb8c3c0bf4a73d383dce01b3bea8bcc361ea89af9b061cfbd57d1
-
SHA512
f8f2e21daa277e030c2928b769811e749dc4d17b319ca18c5fb04811dea90953014ad52fb4cc476225eb326c24b0b34a2edc6e16acf0b6ce7f884b6a53f44212
-
SSDEEP
196608:5KrZ/YeoQ0zEZfb7+YjQbEYi1s0OqnjH+UgNEe5k6IoQ5D0ckH1ajlEZfbEY2:0YwZWCQbEYiXVX4k6mwH1ajWZfbEn
Static task
static1
Behavioral task
behavioral1
Sample
b549eac8b39cd580ba7c8d597bc5efb3_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
Behavioral task
behavioral2
Sample
b549eac8b39cd580ba7c8d597bc5efb3_JaffaCakes118.apk
Resource
android-33-x64-arm64-20240611.1-en
Malware Config
Targets
-
-
Target
b549eac8b39cd580ba7c8d597bc5efb3_JaffaCakes118
-
Size
11.1MB
-
MD5
b549eac8b39cd580ba7c8d597bc5efb3
-
SHA1
34c40a2e6a3137b1c0eb6d47c86be50f1859a97b
-
SHA256
9c9e78c04c1bb8c3c0bf4a73d383dce01b3bea8bcc361ea89af9b061cfbd57d1
-
SHA512
f8f2e21daa277e030c2928b769811e749dc4d17b319ca18c5fb04811dea90953014ad52fb4cc476225eb326c24b0b34a2edc6e16acf0b6ce7f884b6a53f44212
-
SSDEEP
196608:5KrZ/YeoQ0zEZfb7+YjQbEYi1s0OqnjH+UgNEe5k6IoQ5D0ckH1ajlEZfbEY2:0YwZWCQbEYiXVX4k6mwH1ajWZfbEn
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Reads information about phone network operator.
-