General
-
Target
fee0dd9c92cc9d33088cc7b2fa441e44_JaffaCakes118
-
Size
19.5MB
-
Sample
240929-tj58vstgqd
-
MD5
fee0dd9c92cc9d33088cc7b2fa441e44
-
SHA1
8adacb38b493c1ae83e08aca7525b5124c4442e9
-
SHA256
9d7df0bf7aa91a401d0530bdc66030607d523ab317b74576dee8563a14459031
-
SHA512
5c0529c3acc682b2a32fc09d1f7b73bf9c35a0d5277f015c1d19728872566da45f50c02a91a6fc3296dc16bfd2fe99e6fbec9a97a5c7e081490993c424abefe0
-
SSDEEP
393216:Uq0AYjM4mCaAOTevzsshyRAti+w8XeSnL5+jVw8X1Q3XnL5+jmHmP:YfjxmfFgQshyRsVw8XeSnL5+jVw8X18s
Static task
static1
Behavioral task
behavioral1
Sample
fee0dd9c92cc9d33088cc7b2fa441e44_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
fee0dd9c92cc9d33088cc7b2fa441e44_JaffaCakes118.apk
Resource
android-33-x64-arm64-20240624-en
Malware Config
Targets
-
-
Target
fee0dd9c92cc9d33088cc7b2fa441e44_JaffaCakes118
-
Size
19.5MB
-
MD5
fee0dd9c92cc9d33088cc7b2fa441e44
-
SHA1
8adacb38b493c1ae83e08aca7525b5124c4442e9
-
SHA256
9d7df0bf7aa91a401d0530bdc66030607d523ab317b74576dee8563a14459031
-
SHA512
5c0529c3acc682b2a32fc09d1f7b73bf9c35a0d5277f015c1d19728872566da45f50c02a91a6fc3296dc16bfd2fe99e6fbec9a97a5c7e081490993c424abefe0
-
SSDEEP
393216:Uq0AYjM4mCaAOTevzsshyRAti+w8XeSnL5+jVw8X1Q3XnL5+jmHmP:YfjxmfFgQshyRsVw8XeSnL5+jVw8X18s
Score7/10-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Reads information about phone network operator.
-