General
-
Target
b597a4842cbd2245eb5793a11b721c04_JaffaCakes118
-
Size
11.9MB
-
Sample
240616-2sbplssarc
-
MD5
b597a4842cbd2245eb5793a11b721c04
-
SHA1
466896fa57c36dae89e636cd9684a138ecebd3ad
-
SHA256
e00935a5618fb4726b4b3d93702a8b64795eef1ece9e4c1f9a3e906c1c37b8a6
-
SHA512
e2e87544139c6a212fbc413f95bd80462553959cc9b97e4fae1410d83fdf15f0519b1ec489add7bf76012a3e825d404cc4492b54292c1d87f0a5323d9c00309a
-
SSDEEP
196608:dsldDIkDEp00gUtcmo484WqUbGntjHGJACvtuN+k4y5IjnFTxcBxvqtOXoB1XG51:d8U4G0j6cd8W9Mtjm7vANRj5UFTxcopK
Static task
static1
Behavioral task
behavioral1
Sample
b597a4842cbd2245eb5793a11b721c04_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
Behavioral task
behavioral2
Sample
bp.apk
Resource
android-x86-arm-20240611.1-en
Malware Config
Targets
-
-
Target
b597a4842cbd2245eb5793a11b721c04_JaffaCakes118
-
Size
11.9MB
-
MD5
b597a4842cbd2245eb5793a11b721c04
-
SHA1
466896fa57c36dae89e636cd9684a138ecebd3ad
-
SHA256
e00935a5618fb4726b4b3d93702a8b64795eef1ece9e4c1f9a3e906c1c37b8a6
-
SHA512
e2e87544139c6a212fbc413f95bd80462553959cc9b97e4fae1410d83fdf15f0519b1ec489add7bf76012a3e825d404cc4492b54292c1d87f0a5323d9c00309a
-
SSDEEP
196608:dsldDIkDEp00gUtcmo484WqUbGntjHGJACvtuN+k4y5IjnFTxcBxvqtOXoB1XG51:d8U4G0j6cd8W9Mtjm7vANRj5UFTxcopK
Score8/10-
Checks if the Android device is rooted.
-
Checks Android system properties for emulator presence.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries the mobile country code (MCC)
-
-
-
Target
bp.db
-
Size
503KB
-
MD5
cbdc22d39c0a5d6b573bc4c3a0723d62
-
SHA1
0277b88cf6223860c62a6ea0936b57fa4d6e3e5d
-
SHA256
687c013d34e4519d797549b0b34562855e44f645ac1ccca8f74de0fbdd380717
-
SHA512
5ba5d67f170a94afbe9a8544c3a92190ec90fdeeac0313ea735e72022d2669c9f8e7691039e08e0b23f174ed5a0eeef11d7a426725fa25810d67a8342df45abe
-
SSDEEP
12288:f2HrgTAxStoLvnA89xX2GV45+a5hL/s8BocGJVp7:f2HrgUxSGv2u+7hocUz7
-