General
-
Target
57471474e15346b0d79052e9e45abb59_JaffaCakes118
-
Size
332KB
-
Sample
241018-nzbfjavfjd
-
MD5
57471474e15346b0d79052e9e45abb59
-
SHA1
a9475e98c9d8be1f6f8e3b8b33bd851b6986cb7f
-
SHA256
dc77f572908e530b1b789b2af376f415af5baef17fc45b59ce54dfb808c95f2c
-
SHA512
d86f364254dc603d31972e289cd50a6e6184bca3e611a4349e2f2b32eb82e9eb6c12518e4d32b5664b11f9497f33dc952c5fb4afb92e1a11699a18e0845c3280
-
SSDEEP
6144:ACC7XPddyPasM1TcoL9QbjaLD86chtIVTGl7iX/Nzh027iX/Nzh0P9:A7/uPafTcoeXGK36Ty7iX1e27iX1el
Static task
static1
Behavioral task
behavioral1
Sample
57471474e15346b0d79052e9e45abb59_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
57471474e15346b0d79052e9e45abb59_JaffaCakes118.apk
Resource
android-x64-20240624-en
Malware Config
Targets
-
-
Target
57471474e15346b0d79052e9e45abb59_JaffaCakes118
-
Size
332KB
-
MD5
57471474e15346b0d79052e9e45abb59
-
SHA1
a9475e98c9d8be1f6f8e3b8b33bd851b6986cb7f
-
SHA256
dc77f572908e530b1b789b2af376f415af5baef17fc45b59ce54dfb808c95f2c
-
SHA512
d86f364254dc603d31972e289cd50a6e6184bca3e611a4349e2f2b32eb82e9eb6c12518e4d32b5664b11f9497f33dc952c5fb4afb92e1a11699a18e0845c3280
-
SSDEEP
6144:ACC7XPddyPasM1TcoL9QbjaLD86chtIVTGl7iX/Nzh027iX/Nzh0P9:A7/uPafTcoeXGK36Ty7iX1e27iX1el
Score8/10-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-