General
-
Target
a1af5931b489abfb6a960f4f4da784ff_JaffaCakes118
-
Size
2.8MB
-
Sample
240817-jdztsaxepn
-
MD5
a1af5931b489abfb6a960f4f4da784ff
-
SHA1
274c6076f6921f407b76f13b1406c1d2c8781a24
-
SHA256
2e409a8d4d83ccc90c5cf11baf52b4b38fb16401212dddf4a0aaf0aff58f4e1e
-
SHA512
029df750607e809328cf5859893f14a9bde6ed4ededa73f3d240838ce41eeef13c406b3de3403500f8046aa9d3c6ca9f043992352a25416ec07e1942fe6ca2bc
-
SSDEEP
49152:4tutghtuKQuw7hPd147MQOxKZZGQlFTTJwwz5tX8K5h+:uwHPdu7sB66wR5E
Static task
static1
Behavioral task
behavioral1
Sample
a1af5931b489abfb6a960f4f4da784ff_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Malware Config
Targets
-
-
Target
a1af5931b489abfb6a960f4f4da784ff_JaffaCakes118
-
Size
2.8MB
-
MD5
a1af5931b489abfb6a960f4f4da784ff
-
SHA1
274c6076f6921f407b76f13b1406c1d2c8781a24
-
SHA256
2e409a8d4d83ccc90c5cf11baf52b4b38fb16401212dddf4a0aaf0aff58f4e1e
-
SHA512
029df750607e809328cf5859893f14a9bde6ed4ededa73f3d240838ce41eeef13c406b3de3403500f8046aa9d3c6ca9f043992352a25416ec07e1942fe6ca2bc
-
SSDEEP
49152:4tutghtuKQuw7hPd147MQOxKZZGQlFTTJwwz5tX8K5h+:uwHPdu7sB66wR5E
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about active data network
-
Queries the mobile country code (MCC)
-
Queries the unique device ID (IMEI, MEID, IMSI)
-