General
-
Target
b0fa09b179f16e864d9a2dc1e31e70b3_JaffaCakes118
-
Size
1.3MB
-
Sample
240616-a6ngsascjd
-
MD5
b0fa09b179f16e864d9a2dc1e31e70b3
-
SHA1
78d20b5c97f5ac1a5abcba6032072fa6a7cae660
-
SHA256
71e3793c7ce87add11b47ef8a8e1a0db0dd5237349ab3c5e2a9bb6c87ff0f722
-
SHA512
2f83e66942e32b6e8b68be092b880c71089969400cc8eeba86440699bcb4453bb161841096165fbcf0958a74d64c84b1608faccdf7d30b7e0e0d5b4b803cc09d
-
SSDEEP
24576:LE9wwFm9wwFMoNJ9ZgCe1Tqq+8BL+aI0iWccC44lcwzGver2MjkV7DzJI:LECpC079ZgR1OsV+aIdWcBO3vLvxHO
Static task
static1
Behavioral task
behavioral1
Sample
b0fa09b179f16e864d9a2dc1e31e70b3_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
Malware Config
Targets
-
-
Target
b0fa09b179f16e864d9a2dc1e31e70b3_JaffaCakes118
-
Size
1.3MB
-
MD5
b0fa09b179f16e864d9a2dc1e31e70b3
-
SHA1
78d20b5c97f5ac1a5abcba6032072fa6a7cae660
-
SHA256
71e3793c7ce87add11b47ef8a8e1a0db0dd5237349ab3c5e2a9bb6c87ff0f722
-
SHA512
2f83e66942e32b6e8b68be092b880c71089969400cc8eeba86440699bcb4453bb161841096165fbcf0958a74d64c84b1608faccdf7d30b7e0e0d5b4b803cc09d
-
SSDEEP
24576:LE9wwFm9wwFMoNJ9ZgCe1Tqq+8BL+aI0iWccC44lcwzGver2MjkV7DzJI:LECpC079ZgR1OsV+aIdWcBO3vLvxHO
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about active data network
-
Queries the mobile country code (MCC)
-
Reads information about phone network operator.
-