General
-
Target
b1d528b002124a7a24bf26f3fe678cdc_JaffaCakes118
-
Size
3.3MB
-
Sample
240616-fmxh8s1alh
-
MD5
b1d528b002124a7a24bf26f3fe678cdc
-
SHA1
3ba6f71cd08f585614b6b2a2917fd46cec389e83
-
SHA256
68b9ffd0fc69e900672199f26b108812c6f145a2e8b8bf732506d4b94e1a32d9
-
SHA512
06979c7cb4b17c8bf64fa1e37bf4ef659fe99cf0227e703525cea6966cadce173b0c3421ad37e353a51b303280ab506e6fd00b04c63bac3330fed071a4592343
-
SSDEEP
98304:+mC9c74JNHb6j+v3vJ+4x+SOCKk3GkJ2aqxVDueo2lMtmD1lpf3Iv9rs:U16jQWVDbUmD
Static task
static1
Behavioral task
behavioral1
Sample
b1d528b002124a7a24bf26f3fe678cdc_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
Malware Config
Targets
-
-
Target
b1d528b002124a7a24bf26f3fe678cdc_JaffaCakes118
-
Size
3.3MB
-
MD5
b1d528b002124a7a24bf26f3fe678cdc
-
SHA1
3ba6f71cd08f585614b6b2a2917fd46cec389e83
-
SHA256
68b9ffd0fc69e900672199f26b108812c6f145a2e8b8bf732506d4b94e1a32d9
-
SHA512
06979c7cb4b17c8bf64fa1e37bf4ef659fe99cf0227e703525cea6966cadce173b0c3421ad37e353a51b303280ab506e6fd00b04c63bac3330fed071a4592343
-
SSDEEP
98304:+mC9c74JNHb6j+v3vJ+4x+SOCKk3GkJ2aqxVDueo2lMtmD1lpf3Iv9rs:U16jQWVDbUmD
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current nearby Wi-Fi networks
Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.
-
Queries the phone number (MSISDN for GSM devices)
-
Acquires the wake lock
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-