General
-
Target
fe10dd5dbe35b393838946ffcfe5bad9_JaffaCakes118
-
Size
15.9MB
-
Sample
240929-jfzxkaxfnb
-
MD5
fe10dd5dbe35b393838946ffcfe5bad9
-
SHA1
e3acb3170b86dfb59df9b6c5fed3d1bcdc56a231
-
SHA256
34eef95886ff6cad97c863d1e867817291e36dd22624cf748de04f7fb5452af0
-
SHA512
3dee42348e560bef64e6c1d174a5835a1c59bb0d27d6bd7960a50fa690ade9430d20a90061019efa02282c02ab6ff9c1502d6d279a89e9017dff743595a44865
-
SSDEEP
393216:YmLLvHjEzXCy8wrPX+Ag616tjjnFHpTYbFSW4EXjkqJi2bqQmb/:df5y8wDuAry7TYboWVig+/
Behavioral task
behavioral1
Sample
fe10dd5dbe35b393838946ffcfe5bad9_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Malware Config
Targets
-
-
Target
fe10dd5dbe35b393838946ffcfe5bad9_JaffaCakes118
-
Size
15.9MB
-
MD5
fe10dd5dbe35b393838946ffcfe5bad9
-
SHA1
e3acb3170b86dfb59df9b6c5fed3d1bcdc56a231
-
SHA256
34eef95886ff6cad97c863d1e867817291e36dd22624cf748de04f7fb5452af0
-
SHA512
3dee42348e560bef64e6c1d174a5835a1c59bb0d27d6bd7960a50fa690ade9430d20a90061019efa02282c02ab6ff9c1502d6d279a89e9017dff743595a44865
-
SSDEEP
393216:YmLLvHjEzXCy8wrPX+Ag616tjjnFHpTYbFSW4EXjkqJi2bqQmb/:df5y8wDuAry7TYboWVig+/
Score7/10-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about active data network
-
Reads information about phone network operator.
-