General
-
Target
ea888aec00b448fef31dc67925bd20c9_JaffaCakes118
-
Size
13.4MB
-
Sample
240919-eergkszbqe
-
MD5
ea888aec00b448fef31dc67925bd20c9
-
SHA1
f316e0e2495a25a27b65b0988e327461d22c5d1d
-
SHA256
cfa394542d95b5735ec49b1afcf305e7cfad7e10a5a4d9e9f5233d23c154a113
-
SHA512
dc632b82ac3ccf6298ac9a6c2a87577088d0529c6d125b30a407f9d0f7280cad6a91135a181e28b8d2fd1b56e91ebe5ed312f1f164013619961d4bb39c58d90e
-
SSDEEP
393216:fgwisbxbGC0DVpE8vyGOZ2U81KzTJHWmX3buM:f5bxuDVlyGhU8QzTFWmbv
Static task
static1
Behavioral task
behavioral1
Sample
ea888aec00b448fef31dc67925bd20c9_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Malware Config
Targets
-
-
Target
ea888aec00b448fef31dc67925bd20c9_JaffaCakes118
-
Size
13.4MB
-
MD5
ea888aec00b448fef31dc67925bd20c9
-
SHA1
f316e0e2495a25a27b65b0988e327461d22c5d1d
-
SHA256
cfa394542d95b5735ec49b1afcf305e7cfad7e10a5a4d9e9f5233d23c154a113
-
SHA512
dc632b82ac3ccf6298ac9a6c2a87577088d0529c6d125b30a407f9d0f7280cad6a91135a181e28b8d2fd1b56e91ebe5ed312f1f164013619961d4bb39c58d90e
-
SSDEEP
393216:fgwisbxbGC0DVpE8vyGOZ2U81KzTJHWmX3buM:f5bxuDVlyGhU8QzTFWmbv
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current nearby Wi-Fi networks
Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.
-
Queries the phone number (MSISDN for GSM devices)
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Reads information about phone network operator.
-