General
-
Target
d10f07211b6251e54fa4b12c5eb41926_JaffaCakes118
-
Size
30.2MB
-
Sample
240907-ew3wyavaqn
-
MD5
d10f07211b6251e54fa4b12c5eb41926
-
SHA1
b660ba885c1677afc2033f9d53c5960129e19704
-
SHA256
1f0e7d8526f67dc4ab7e2e377a94b24da7a33d2a2d387840b1abf05ae488d7f6
-
SHA512
37974b2bd34c8df0c036491872695130bf82345484e3da4ff7145e6b39778624ea5013ac15ceb6e32959b7468f76aac8db751c72ed29263348b779dbf0b02d7c
-
SSDEEP
786432:B/0aqi1/kwmNX/TOWcY5dZ5tW0bNlvrLHIaDoeEYL:BMIaNywdZW0zHZL
Static task
static1
Behavioral task
behavioral1
Sample
d10f07211b6251e54fa4b12c5eb41926_JaffaCakes118.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
d10f07211b6251e54fa4b12c5eb41926_JaffaCakes118.apk
Resource
android-x64-20240624-en
Malware Config
Targets
-
-
Target
d10f07211b6251e54fa4b12c5eb41926_JaffaCakes118
-
Size
30.2MB
-
MD5
d10f07211b6251e54fa4b12c5eb41926
-
SHA1
b660ba885c1677afc2033f9d53c5960129e19704
-
SHA256
1f0e7d8526f67dc4ab7e2e377a94b24da7a33d2a2d387840b1abf05ae488d7f6
-
SHA512
37974b2bd34c8df0c036491872695130bf82345484e3da4ff7145e6b39778624ea5013ac15ceb6e32959b7468f76aac8db751c72ed29263348b779dbf0b02d7c
-
SSDEEP
786432:B/0aqi1/kwmNX/TOWcY5dZ5tW0bNlvrLHIaDoeEYL:BMIaNywdZW0zHZL
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about active data network
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Checks the presence of a debugger
-