General
-
Target
28c09f5166796632e8cc02344eaafb19_JaffaCakes118
-
Size
1.8MB
-
Sample
241009-cbe82avgqg
-
MD5
28c09f5166796632e8cc02344eaafb19
-
SHA1
f2ddaa5449547b2849e2d4dff18ff799a363220f
-
SHA256
8ae8f0e90eda24ddf94424db0a6cc6e6cc1faaef3030cdec5998e95de4b665dc
-
SHA512
ddb707594f7c5b0d59100a778b0e384babc62d03e54548b0587ad19ffad288f43b33533d861769e1827d4df3213f350916df21e757a7b4421a67757716fdeae7
-
SSDEEP
49152:vTX7lbPBJmZOz6sy03mytjfMEvkk2jrgMkRgl:vDJbPnT6ormCmj0PR6
Static task
static1
Behavioral task
behavioral1
Sample
28c09f5166796632e8cc02344eaafb19_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
assets.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral3
Sample
assets.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral4
Sample
assets.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Targets
-
-
Target
28c09f5166796632e8cc02344eaafb19_JaffaCakes118
-
Size
1.8MB
-
MD5
28c09f5166796632e8cc02344eaafb19
-
SHA1
f2ddaa5449547b2849e2d4dff18ff799a363220f
-
SHA256
8ae8f0e90eda24ddf94424db0a6cc6e6cc1faaef3030cdec5998e95de4b665dc
-
SHA512
ddb707594f7c5b0d59100a778b0e384babc62d03e54548b0587ad19ffad288f43b33533d861769e1827d4df3213f350916df21e757a7b4421a67757716fdeae7
-
SSDEEP
49152:vTX7lbPBJmZOz6sy03mytjfMEvkk2jrgMkRgl:vDJbPnT6ormCmj0PR6
Score7/10-
Queries the phone number (MSISDN for GSM devices)
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
-
-
Target
assets.db
-
Size
77KB
-
MD5
9837ebea45d368f0da9d2e182b9670e3
-
SHA1
06892d46042035b0a71415b16996b41eb66f3ffb
-
SHA256
11468f51feee1ac6b2044d011326e1831a69cf07109e6184d2c853d651b9e609
-
SHA512
835e4168b5c5c8655973821aa54ab13fdb316800aca2c995e7d8f8a1d571e77e276a09c12b5d94d71e30228bef5561b83b11d54c8afc1cb1eb62d24d2fa72df4
-
SSDEEP
1536:G+GH4xr9JRg/xh5PmkrMO0jzsg4u3GQhKzdcYBwTKS+YQJsjFuXrZDCPf:G2hTRO7PHrMHzsgPzQLwKvYTj+tGPf
Score1/10 -