General
-
Target
88f87a0cbf6c9cb27ce0267d59c844e8_JaffaCakes118
-
Size
14.9MB
-
Sample
241103-bxheva1cna
-
MD5
88f87a0cbf6c9cb27ce0267d59c844e8
-
SHA1
0c41bf19e67fb18cf4c0366f6bd2781e7b23991b
-
SHA256
89bf559ba5ac7164c4fbb1a403a07767f309600c3ce5a89ad442c3367264e303
-
SHA512
79dd748419165a4a69c449036e858d77ef5d7b91c6357d4058b632c4ae0a018193d74ed8006d53280ed9b67678312d48fc37a66a63aa6690bab44ddffbc393d9
-
SSDEEP
393216:ZiOC5ImrasltF5xveRqUQY88SSb9Yy2ml+:HOI8aslf7v7Yxbz8
Static task
static1
Behavioral task
behavioral1
Sample
88f87a0cbf6c9cb27ce0267d59c844e8_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
88f87a0cbf6c9cb27ce0267d59c844e8_JaffaCakes118.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Targets
-
-
Target
88f87a0cbf6c9cb27ce0267d59c844e8_JaffaCakes118
-
Size
14.9MB
-
MD5
88f87a0cbf6c9cb27ce0267d59c844e8
-
SHA1
0c41bf19e67fb18cf4c0366f6bd2781e7b23991b
-
SHA256
89bf559ba5ac7164c4fbb1a403a07767f309600c3ce5a89ad442c3367264e303
-
SHA512
79dd748419165a4a69c449036e858d77ef5d7b91c6357d4058b632c4ae0a018193d74ed8006d53280ed9b67678312d48fc37a66a63aa6690bab44ddffbc393d9
-
SSDEEP
393216:ZiOC5ImrasltF5xveRqUQY88SSb9Yy2ml+:HOI8aslf7v7Yxbz8
Score8/10-
Checks if the Android device is rooted.
-
Queries account information for other applications stored on the device
Application may abuse the framework's APIs to collect account information stored on the device.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries the phone number (MSISDN for GSM devices)
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-