General
-
Target
111607d6298a7edaa609dbd56b610ae9_JaffaCakes118
-
Size
2.2MB
-
Sample
241004-ast3eayclh
-
MD5
111607d6298a7edaa609dbd56b610ae9
-
SHA1
fe7e4e8dd105c9a55f7fb1fefa6ad3e5c8fb9b76
-
SHA256
6dc8e58b9dd615ac3eb0529ca350414e6eca47a3acd28ae2ec62e30419c07328
-
SHA512
3dea0e7cf9af7a27df880c98698bda8c30b96265360bf30708028c08dcb63ccb82676765650558eae8c88fa2c19396806719141d53b170c842d550a2fa96bcbb
-
SSDEEP
49152:xwYqpu4sSwGj7PCHBHdJ0xNCRPq8vpQvSpud8YxHYEGIZnw9xaiih7xO0jfH:xupxsSwGj65dmCpBGPd5HYEdeaHxO0j/
Static task
static1
Behavioral task
behavioral1
Sample
111607d6298a7edaa609dbd56b610ae9_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
111607d6298a7edaa609dbd56b610ae9_JaffaCakes118.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Targets
-
-
Target
111607d6298a7edaa609dbd56b610ae9_JaffaCakes118
-
Size
2.2MB
-
MD5
111607d6298a7edaa609dbd56b610ae9
-
SHA1
fe7e4e8dd105c9a55f7fb1fefa6ad3e5c8fb9b76
-
SHA256
6dc8e58b9dd615ac3eb0529ca350414e6eca47a3acd28ae2ec62e30419c07328
-
SHA512
3dea0e7cf9af7a27df880c98698bda8c30b96265360bf30708028c08dcb63ccb82676765650558eae8c88fa2c19396806719141d53b170c842d550a2fa96bcbb
-
SSDEEP
49152:xwYqpu4sSwGj7PCHBHdJ0xNCRPq8vpQvSpud8YxHYEGIZnw9xaiih7xO0jfH:xupxsSwGj65dmCpBGPd5HYEdeaHxO0j/
Score7/10-
Queries account information for other applications stored on the device
Application may abuse the framework's APIs to collect account information stored on the device.
-
Queries information about active data network
-
Reads information about phone network operator.
-