General
-
Target
e118ec2a0823ac073ce00b5e0eeb92f3_JaffaCakes118
-
Size
19.4MB
-
Sample
240914-1la9tsybqd
-
MD5
e118ec2a0823ac073ce00b5e0eeb92f3
-
SHA1
5e2f00b6dd6aa1cae4fef446abc646887a070260
-
SHA256
ee5143ff0941d0f221cf6d86c3dd91cdd4a163409fb54bfffa68680c47ab954e
-
SHA512
0aa0693df44f1640273e4d28f0eda278c08f01c916c59c3b322de7d4f471f34f2106e9995a2163981b9bb4123fd73edaaf0ae7c8bbda55c688fbfe94714fc0cf
-
SSDEEP
393216:ROahw00oq4Fh6zwLNsVznEchWFd6fC5VVlLZNWL6jaU1xkEz:fTZFhwmNsVzuFkfoVHn4Sxk8
Static task
static1
Behavioral task
behavioral1
Sample
e118ec2a0823ac073ce00b5e0eeb92f3_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Malware Config
Targets
-
-
Target
e118ec2a0823ac073ce00b5e0eeb92f3_JaffaCakes118
-
Size
19.4MB
-
MD5
e118ec2a0823ac073ce00b5e0eeb92f3
-
SHA1
5e2f00b6dd6aa1cae4fef446abc646887a070260
-
SHA256
ee5143ff0941d0f221cf6d86c3dd91cdd4a163409fb54bfffa68680c47ab954e
-
SHA512
0aa0693df44f1640273e4d28f0eda278c08f01c916c59c3b322de7d4f471f34f2106e9995a2163981b9bb4123fd73edaaf0ae7c8bbda55c688fbfe94714fc0cf
-
SSDEEP
393216:ROahw00oq4Fh6zwLNsVznEchWFd6fC5VVlLZNWL6jaU1xkEz:fTZFhwmNsVzuFkfoVHn4Sxk8
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the mobile country code (MCC)
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-