General
-
Target
2b4688b011a351c5c8f5e076a49c501d_JaffaCakes118
-
Size
3.0MB
-
Sample
241009-fmf69azfmk
-
MD5
2b4688b011a351c5c8f5e076a49c501d
-
SHA1
705d4506d4972adb8718ef273fd3285540f3f35b
-
SHA256
e98b4a88f46b66a20f60742839241bc374e61f00e186e336f3812c20aa611cf3
-
SHA512
300b262384f2325263cdf3450de8a8fc158449222691e7cf1a1ec4f4603a51452e13e23635a753e7e8f1e15cb57aff5412e2ec26d314ee33beefdb2d32a62247
-
SSDEEP
98304:Vx+YoYk+oUE8n2d1l5/cGW11Lq9CgiJc9ze+wDu5:SxYD5E8k1jEd1LoCgkKy+wk
Static task
static1
Behavioral task
behavioral1
Sample
2b4688b011a351c5c8f5e076a49c501d_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
2b4688b011a351c5c8f5e076a49c501d_JaffaCakes118.apk
Resource
android-x64-20240624-en
Malware Config
Targets
-
-
Target
2b4688b011a351c5c8f5e076a49c501d_JaffaCakes118
-
Size
3.0MB
-
MD5
2b4688b011a351c5c8f5e076a49c501d
-
SHA1
705d4506d4972adb8718ef273fd3285540f3f35b
-
SHA256
e98b4a88f46b66a20f60742839241bc374e61f00e186e336f3812c20aa611cf3
-
SHA512
300b262384f2325263cdf3450de8a8fc158449222691e7cf1a1ec4f4603a51452e13e23635a753e7e8f1e15cb57aff5412e2ec26d314ee33beefdb2d32a62247
-
SSDEEP
98304:Vx+YoYk+oUE8n2d1l5/cGW11Lq9CgiJc9ze+wDu5:SxYD5E8k1jEd1LoCgkKy+wk
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the mobile country code (MCC)
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Checks the presence of a debugger
-