General
-
Target
4610eae564c78e469ac6e59a3cf9eec3_JaffaCakes118
-
Size
19.5MB
-
Sample
241015-f52wnsxcnb
-
MD5
4610eae564c78e469ac6e59a3cf9eec3
-
SHA1
8b1e4e25e8d8755e020a6192bcdac350df578987
-
SHA256
7d8558c05ca7fc02634567504af0d480490ecf68512e1c08b0e167535233f611
-
SHA512
f79afea9432f47280c9e3f85a9c729bfb20fa4ef01ed36d9983657edc6ab336e4c72d06ab4c3a68a732233f9007b8e7662aaffe90776ceb088e6fdff091773ed
-
SSDEEP
393216:4wDuzyW4O2y5FtevzsshyRAtT1bNpw8XPanL5+jHw8XTQ35nL5+jiHml:tey3OXRgQshyRsbpw8XPanL5+jHw8XTP
Static task
static1
Behavioral task
behavioral1
Sample
4610eae564c78e469ac6e59a3cf9eec3_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Malware Config
Targets
-
-
Target
4610eae564c78e469ac6e59a3cf9eec3_JaffaCakes118
-
Size
19.5MB
-
MD5
4610eae564c78e469ac6e59a3cf9eec3
-
SHA1
8b1e4e25e8d8755e020a6192bcdac350df578987
-
SHA256
7d8558c05ca7fc02634567504af0d480490ecf68512e1c08b0e167535233f611
-
SHA512
f79afea9432f47280c9e3f85a9c729bfb20fa4ef01ed36d9983657edc6ab336e4c72d06ab4c3a68a732233f9007b8e7662aaffe90776ceb088e6fdff091773ed
-
SSDEEP
393216:4wDuzyW4O2y5FtevzsshyRAtT1bNpw8XPanL5+jHw8XTQ35nL5+jiHml:tey3OXRgQshyRsbpw8XPanL5+jHw8XTP
Score7/10-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Reads information about phone network operator.
-