General
-
Target
60394bc237bfc7f50e94ea23ff6581a7_JaffaCakes118
-
Size
7.6MB
-
Sample
240720-2dspksyaqg
-
MD5
60394bc237bfc7f50e94ea23ff6581a7
-
SHA1
9927458d67504e1e615c942613627f89f5fd5a22
-
SHA256
97611d4d6e5e9aef1eb23e728232ca893a266a59487cae13fe9f35df12945a14
-
SHA512
0f406b38086358eb37ff4ab2dc30b0be4588758387c4eafc00e69845aa2fcd4be5d10a8b559472c819a066c4cb8c5739fcb7fbb22ddbd71a9fec4bd192781340
-
SSDEEP
196608:xpHOroJ7E5qaro13ghwTHwaZ7pGnlPIYa8retoBJMWt5aIGic7V4H:xNOroJ45jiCi1Z1+PIYXHtma
Static task
static1
Behavioral task
behavioral1
Sample
60394bc237bfc7f50e94ea23ff6581a7_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Malware Config
Targets
-
-
Target
60394bc237bfc7f50e94ea23ff6581a7_JaffaCakes118
-
Size
7.6MB
-
MD5
60394bc237bfc7f50e94ea23ff6581a7
-
SHA1
9927458d67504e1e615c942613627f89f5fd5a22
-
SHA256
97611d4d6e5e9aef1eb23e728232ca893a266a59487cae13fe9f35df12945a14
-
SHA512
0f406b38086358eb37ff4ab2dc30b0be4588758387c4eafc00e69845aa2fcd4be5d10a8b559472c819a066c4cb8c5739fcb7fbb22ddbd71a9fec4bd192781340
-
SSDEEP
196608:xpHOroJ7E5qaro13ghwTHwaZ7pGnlPIYa8retoBJMWt5aIGic7V4H:xNOroJ45jiCi1Z1+PIYXHtma
Score8/10-
Checks if the Android device is rooted.
-
Checks Android system properties for emulator presence.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about active data network
-
Queries the mobile country code (MCC)
-