General
-
Target
b1d45a508c04e4a5f6664e9ddac28127_JaffaCakes118
-
Size
5.7MB
-
Sample
240616-fmj8xavbml
-
MD5
b1d45a508c04e4a5f6664e9ddac28127
-
SHA1
f133a535b28659c64ade7dcfa5c22538619b8ffd
-
SHA256
6be3cba9be1ce0c21f05bb19dfff973eb898d3702a9420418d315d2bf43cdf38
-
SHA512
be8bd2f6870c0759810258c4e5c11773cb57d67566872bdb4d98c9054d6d4b5cca9a1f342bf1fbd8766591328fd5503453af2d9f335c440543bfd34a0106c4f1
-
SSDEEP
98304:6jgZGKUjx7cV9Y4efjfk2VoJR+q3Hv7AmxFKlz1Wc93bX:6sycsj3oJRBf7LxFWz1WuLX
Static task
static1
Behavioral task
behavioral1
Sample
b1d45a508c04e4a5f6664e9ddac28127_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
Malware Config
Targets
-
-
Target
b1d45a508c04e4a5f6664e9ddac28127_JaffaCakes118
-
Size
5.7MB
-
MD5
b1d45a508c04e4a5f6664e9ddac28127
-
SHA1
f133a535b28659c64ade7dcfa5c22538619b8ffd
-
SHA256
6be3cba9be1ce0c21f05bb19dfff973eb898d3702a9420418d315d2bf43cdf38
-
SHA512
be8bd2f6870c0759810258c4e5c11773cb57d67566872bdb4d98c9054d6d4b5cca9a1f342bf1fbd8766591328fd5503453af2d9f335c440543bfd34a0106c4f1
-
SSDEEP
98304:6jgZGKUjx7cV9Y4efjfk2VoJR+q3Hv7AmxFKlz1Wc93bX:6sycsj3oJRBf7LxFWz1WuLX
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about active data network
-
Queries the mobile country code (MCC)
-