General
-
Target
530610bdc8ff48013317fefcf7876dc5_JaffaCakes118
-
Size
257KB
-
Sample
241017-wwktssyape
-
MD5
530610bdc8ff48013317fefcf7876dc5
-
SHA1
2e458e9d0f38707998f1d67fada9547ba9a3d023
-
SHA256
70ea01d008463fb8cb32922eb46f7747ad8553bb0557e524ba9258388f6a3bde
-
SHA512
1f0fb1606d3ada6d7857b248ad88b924d7597ea3aefe9abcde5255ba71e398a560c788ea3b1f9d5b787edee2d94c9e0bf58daa0a1f726398cf93dd8ad4b76a4b
-
SSDEEP
6144:LFha3ha+mis4NbRG32tkrXwIJckat9SZEyEcAhBn+R9pxMN3oPa:Zhuho74tRGmerAIikQSZPxAj+xx4oPa
Static task
static1
Behavioral task
behavioral1
Sample
530610bdc8ff48013317fefcf7876dc5_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
530610bdc8ff48013317fefcf7876dc5_JaffaCakes118.apk
Resource
android-x64-20240624-en
Malware Config
Targets
-
-
Target
530610bdc8ff48013317fefcf7876dc5_JaffaCakes118
-
Size
257KB
-
MD5
530610bdc8ff48013317fefcf7876dc5
-
SHA1
2e458e9d0f38707998f1d67fada9547ba9a3d023
-
SHA256
70ea01d008463fb8cb32922eb46f7747ad8553bb0557e524ba9258388f6a3bde
-
SHA512
1f0fb1606d3ada6d7857b248ad88b924d7597ea3aefe9abcde5255ba71e398a560c788ea3b1f9d5b787edee2d94c9e0bf58daa0a1f726398cf93dd8ad4b76a4b
-
SSDEEP
6144:LFha3ha+mis4NbRG32tkrXwIJckat9SZEyEcAhBn+R9pxMN3oPa:Zhuho74tRGmerAIikQSZPxAj+xx4oPa
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about active data network
-
Queries the unique device ID (IMEI, MEID, IMSI)
-