General
-
Target
37a7279ef458a5a52d308742a9951736_JaffaCakes118
-
Size
1.9MB
-
Sample
241012-a7jj8atcmf
-
MD5
37a7279ef458a5a52d308742a9951736
-
SHA1
5887413c609541b6a89b9eb0bab2a238103bc533
-
SHA256
44d192ab5d1265a9815e61939ff2d25d731c5e4787b77bfae9cd3a76bd62f57c
-
SHA512
1d3ff0ae17386db0dc64cbe0dc751637f3932cec0364c01ff70c9b86a6e5d8f2838cf24e085a9a4044ceabb4e3fcd656794489bdba127615f5bc29814ff39369
-
SSDEEP
49152:yoAnyEEUPX250BnRb619xu1g4SoQug3SLxv1/VsJyiLs:q3X25snu9xsxSD9ifVGtg
Static task
static1
Behavioral task
behavioral1
Sample
37a7279ef458a5a52d308742a9951736_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Malware Config
Targets
-
-
Target
37a7279ef458a5a52d308742a9951736_JaffaCakes118
-
Size
1.9MB
-
MD5
37a7279ef458a5a52d308742a9951736
-
SHA1
5887413c609541b6a89b9eb0bab2a238103bc533
-
SHA256
44d192ab5d1265a9815e61939ff2d25d731c5e4787b77bfae9cd3a76bd62f57c
-
SHA512
1d3ff0ae17386db0dc64cbe0dc751637f3932cec0364c01ff70c9b86a6e5d8f2838cf24e085a9a4044ceabb4e3fcd656794489bdba127615f5bc29814ff39369
-
SSDEEP
49152:yoAnyEEUPX250BnRb619xu1g4SoQug3SLxv1/VsJyiLs:q3X25snu9xsxSD9ifVGtg
Score7/10-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries the phone number (MSISDN for GSM devices)
-
Reads the content of SMS inbox messages.
-
Queries information about active data network
-
Queries the mobile country code (MCC)
-