General
-
Target
b8760072dbb7e5727d1a378f41ca6f6c_JaffaCakes118
-
Size
19.0MB
-
Sample
240617-ny3hmatcmr
-
MD5
b8760072dbb7e5727d1a378f41ca6f6c
-
SHA1
93fab199a6a01bf9c4c8dd29b7fc535eccda688a
-
SHA256
9962dd49e6c4ee1eaf92f44abd20134bc183fad10aa1d8db1c1bc4ed3d4bbd10
-
SHA512
d00ab4006ee12e4318e1799ebcaaafb25bde888c6d1771ff4f8df6dfeccfd6029ee3f9bfc6f1afb4394fd362eed1de9c2cbd7fe68ecd78043f878f03399dd112
-
SSDEEP
393216:upBMu6N5by3wBDSx/XaaKu6URt4myin+0dfpKWJqfhU:yyhN5byoOx/qaLfRtLpn+0tp1L
Static task
static1
Behavioral task
behavioral1
Sample
b8760072dbb7e5727d1a378f41ca6f6c_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
Malware Config
Targets
-
-
Target
b8760072dbb7e5727d1a378f41ca6f6c_JaffaCakes118
-
Size
19.0MB
-
MD5
b8760072dbb7e5727d1a378f41ca6f6c
-
SHA1
93fab199a6a01bf9c4c8dd29b7fc535eccda688a
-
SHA256
9962dd49e6c4ee1eaf92f44abd20134bc183fad10aa1d8db1c1bc4ed3d4bbd10
-
SHA512
d00ab4006ee12e4318e1799ebcaaafb25bde888c6d1771ff4f8df6dfeccfd6029ee3f9bfc6f1afb4394fd362eed1de9c2cbd7fe68ecd78043f878f03399dd112
-
SSDEEP
393216:upBMu6N5by3wBDSx/XaaKu6URt4myin+0dfpKWJqfhU:yyhN5byoOx/qaLfRtLpn+0tp1L
Score7/10-
Queries account information for other applications stored on the device
Application may abuse the framework's APIs to collect account information stored on the device.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Listens for changes in the sensor environment (might be used to detect emulation)
-