General
-
Target
09b0b89f5afba38a52f627894e1caa5c_JaffaCakes118
-
Size
479KB
-
Sample
241002-jzvryswalq
-
MD5
09b0b89f5afba38a52f627894e1caa5c
-
SHA1
ac03bb8b067bc4a2f369217fa2094e3ca7e99d8d
-
SHA256
d71d7680ad9e75f3f65e52ae47ce9f646eb77108f5dca5b5ecb9281be07f18f8
-
SHA512
bf2d17dcb61faab33e4f8e1b638a5796b4289391acef1a7c207839f227d50aacf011d1095f6dceab32b1e7620f5f85a898266470240823d9a0cb73c1c918dae7
-
SSDEEP
12288:QsDX4Sg7aRM9tcRRZZ5c09xP7ufmh607YjCGOJDXzsYAqsu:V4SkaRqcjDy09FYApNGRu
Static task
static1
Behavioral task
behavioral1
Sample
09b0b89f5afba38a52f627894e1caa5c_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
09b0b89f5afba38a52f627894e1caa5c_JaffaCakes118.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
09b0b89f5afba38a52f627894e1caa5c_JaffaCakes118.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Targets
-
-
Target
09b0b89f5afba38a52f627894e1caa5c_JaffaCakes118
-
Size
479KB
-
MD5
09b0b89f5afba38a52f627894e1caa5c
-
SHA1
ac03bb8b067bc4a2f369217fa2094e3ca7e99d8d
-
SHA256
d71d7680ad9e75f3f65e52ae47ce9f646eb77108f5dca5b5ecb9281be07f18f8
-
SHA512
bf2d17dcb61faab33e4f8e1b638a5796b4289391acef1a7c207839f227d50aacf011d1095f6dceab32b1e7620f5f85a898266470240823d9a0cb73c1c918dae7
-
SSDEEP
12288:QsDX4Sg7aRM9tcRRZZ5c09xP7ufmh607YjCGOJDXzsYAqsu:V4SkaRqcjDy09FYApNGRu
Score8/10-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries the phone number (MSISDN for GSM devices)
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Queries information about active data network
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-