General
-
Target
43e5f336d967112285349cfed0010d13_JaffaCakes118
-
Size
2.8MB
-
Sample
240714-cqabbsshnj
-
MD5
43e5f336d967112285349cfed0010d13
-
SHA1
5878adb9e4625c79d9e4c4aa8ed0e8d625d277b3
-
SHA256
976e13ec5b8a770078f9166e8548d6a55cf3d7422237a33d777b311566db7b7c
-
SHA512
80e61726cb91b8c10ef128b49ffd9d696c2747ea43fdab498e7065eb59216997a4c6b6ca422aaed1b658daaf94116ee1e3b1986cddbbd88bd5b65bf452ee9103
-
SSDEEP
49152:gq55MTrgBlvthiZjxgUG7v8nlROTF/XOPWHMBkdnH/KZIClmFZCa5JItfj:guMT4lriF/IoyTF/+PWHMBoH/UgAyJcL
Static task
static1
Behavioral task
behavioral1
Sample
43e5f336d967112285349cfed0010d13_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
43e5f336d967112285349cfed0010d13_JaffaCakes118.apk
Resource
android-33-x64-arm64-20240624-en
Malware Config
Targets
-
-
Target
43e5f336d967112285349cfed0010d13_JaffaCakes118
-
Size
2.8MB
-
MD5
43e5f336d967112285349cfed0010d13
-
SHA1
5878adb9e4625c79d9e4c4aa8ed0e8d625d277b3
-
SHA256
976e13ec5b8a770078f9166e8548d6a55cf3d7422237a33d777b311566db7b7c
-
SHA512
80e61726cb91b8c10ef128b49ffd9d696c2747ea43fdab498e7065eb59216997a4c6b6ca422aaed1b658daaf94116ee1e3b1986cddbbd88bd5b65bf452ee9103
-
SSDEEP
49152:gq55MTrgBlvthiZjxgUG7v8nlROTF/XOPWHMBkdnH/KZIClmFZCa5JItfj:guMT4lriF/IoyTF/+PWHMBoH/UgAyJcL
Score7/10-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about active data network
-
Reads information about phone network operator.
-