General
-
Target
d041d7a3bd37103a51faa8295dbf5986_JaffaCakes118
-
Size
5.9MB
-
Sample
240906-xqk32sshqq
-
MD5
d041d7a3bd37103a51faa8295dbf5986
-
SHA1
f5f4e269a29c1cd2390d0f09b41cc5b0f880dbc2
-
SHA256
ce429f54e9f5753532cad2c609dc46975d0ca5ef792c496e37e3f626a014c7bd
-
SHA512
9c0df5551a6f70399f92104e7fa1c6bcfc5bcd12f499c2ace191ed9c4579baeee4ce6e0bd34ec9808c1aea470e6f42480ebf1eb507c48b5c43615f03b6112a61
-
SSDEEP
98304:5fsadOybik4gpS8U90VUJyr53bgOE25JAOPArfT6+F95UHmZkgK:MLaS8U9qUJyVgORbPgT6qKx
Static task
static1
Behavioral task
behavioral1
Sample
d041d7a3bd37103a51faa8295dbf5986_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
d041d7a3bd37103a51faa8295dbf5986_JaffaCakes118.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
d041d7a3bd37103a51faa8295dbf5986_JaffaCakes118.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Targets
-
-
Target
d041d7a3bd37103a51faa8295dbf5986_JaffaCakes118
-
Size
5.9MB
-
MD5
d041d7a3bd37103a51faa8295dbf5986
-
SHA1
f5f4e269a29c1cd2390d0f09b41cc5b0f880dbc2
-
SHA256
ce429f54e9f5753532cad2c609dc46975d0ca5ef792c496e37e3f626a014c7bd
-
SHA512
9c0df5551a6f70399f92104e7fa1c6bcfc5bcd12f499c2ace191ed9c4579baeee4ce6e0bd34ec9808c1aea470e6f42480ebf1eb507c48b5c43615f03b6112a61
-
SSDEEP
98304:5fsadOybik4gpS8U90VUJyr53bgOE25JAOPArfT6+F95UHmZkgK:MLaS8U9qUJyVgORbPgT6qKx
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-