General
-
Target
0a6837bb31efd91ec8df1419587bfb5d_JaffaCakes118
-
Size
2.7MB
-
Sample
241002-nhjqksxdnh
-
MD5
0a6837bb31efd91ec8df1419587bfb5d
-
SHA1
8eb24fe20470acac40b3ae406824ca12b4ca68a7
-
SHA256
70a04cc83ff92c98074f9d6780a928b31213c7ae9c376a7bc58f223d1f92afb7
-
SHA512
46ee83478c5feb17e5d395297f998ca758734ef655dea047255aeaac5ea42eb7588d49559c47997781f4646459a93dbea9fde159630d8653b0f78213b4452fa2
-
SSDEEP
49152:2t3LexIoht0RJBKAIINRO8/m4JWvGoZB41CjP6/JreBjYqhtSLjOR:2RJohiIINz+4EuoZi62sjYqhtSLjOR
Static task
static1
Behavioral task
behavioral1
Sample
0a6837bb31efd91ec8df1419587bfb5d_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
0a6837bb31efd91ec8df1419587bfb5d_JaffaCakes118.apk
Resource
android-x64-20240624-en
Malware Config
Targets
-
-
Target
0a6837bb31efd91ec8df1419587bfb5d_JaffaCakes118
-
Size
2.7MB
-
MD5
0a6837bb31efd91ec8df1419587bfb5d
-
SHA1
8eb24fe20470acac40b3ae406824ca12b4ca68a7
-
SHA256
70a04cc83ff92c98074f9d6780a928b31213c7ae9c376a7bc58f223d1f92afb7
-
SHA512
46ee83478c5feb17e5d395297f998ca758734ef655dea047255aeaac5ea42eb7588d49559c47997781f4646459a93dbea9fde159630d8653b0f78213b4452fa2
-
SSDEEP
49152:2t3LexIoht0RJBKAIINRO8/m4JWvGoZB41CjP6/JreBjYqhtSLjOR:2RJohiIINz+4EuoZi62sjYqhtSLjOR
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-