General
-
Target
01cc77466bb4f9a6eee6bb59dc4b43d1_JaffaCakes118
-
Size
1.9MB
-
Sample
240930-rrn87szelm
-
MD5
01cc77466bb4f9a6eee6bb59dc4b43d1
-
SHA1
3ea03e1fde00181a727f4ea04d5c7a3b3a6fc37f
-
SHA256
9f7275be08bf19b6e1ee5cd0d8e74c5ccdd798aaff861da540a0fbdc15132b9e
-
SHA512
a8ce21d9138bf5d1c8a9c1ac5d8f1779fa4a65f278348ee1f08837f961774b83a87bab33192e4e783deef7b9ca8e14a9858924bae5a40f666d3848ebbbebbbf4
-
SSDEEP
49152:0+//QsdZncgD73GNMgsLXPgKHakBbOKTPFyyDZdgxr4HdJ:0WXncgfGWgszPbBRyBSr
Static task
static1
Behavioral task
behavioral1
Sample
01cc77466bb4f9a6eee6bb59dc4b43d1_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Malware Config
Targets
-
-
Target
01cc77466bb4f9a6eee6bb59dc4b43d1_JaffaCakes118
-
Size
1.9MB
-
MD5
01cc77466bb4f9a6eee6bb59dc4b43d1
-
SHA1
3ea03e1fde00181a727f4ea04d5c7a3b3a6fc37f
-
SHA256
9f7275be08bf19b6e1ee5cd0d8e74c5ccdd798aaff861da540a0fbdc15132b9e
-
SHA512
a8ce21d9138bf5d1c8a9c1ac5d8f1779fa4a65f278348ee1f08837f961774b83a87bab33192e4e783deef7b9ca8e14a9858924bae5a40f666d3848ebbbebbbf4
-
SSDEEP
49152:0+//QsdZncgD73GNMgsLXPgKHakBbOKTPFyyDZdgxr4HdJ:0WXncgfGWgszPbBRyBSr
Score7/10-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about active data network
-
Requests dangerous framework permissions
-