General
-
Target
8c65e2f1ff49c2186618945dc2233c25_JaffaCakes118
-
Size
3.0MB
-
Sample
241103-txmnnsxpdx
-
MD5
8c65e2f1ff49c2186618945dc2233c25
-
SHA1
161472341187232f16b1e935eaa0cac99bbe28dd
-
SHA256
8d113b159b86a8bef92358748bbe25251de09eeecb5b7865119593b3f634a535
-
SHA512
8d3f0535782eed42dbf5afb3cdc6534e87ef4750e1c9989af6bbe5dc5fbe104ed685130700bbcbad971c3a8cfa7eae38467e11e942f13d5cc99557b59c091487
-
SSDEEP
49152:V41Z+bBFn6j+a6d0YqJ3/yB0wj+q0JhU1lEl9lCi3xM69us6GCVYhi8:VWcuCa6dX+3/yBP+thU1elDj3996R+9
Static task
static1
Behavioral task
behavioral1
Sample
8c65e2f1ff49c2186618945dc2233c25_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Malware Config
Targets
-
-
Target
8c65e2f1ff49c2186618945dc2233c25_JaffaCakes118
-
Size
3.0MB
-
MD5
8c65e2f1ff49c2186618945dc2233c25
-
SHA1
161472341187232f16b1e935eaa0cac99bbe28dd
-
SHA256
8d113b159b86a8bef92358748bbe25251de09eeecb5b7865119593b3f634a535
-
SHA512
8d3f0535782eed42dbf5afb3cdc6534e87ef4750e1c9989af6bbe5dc5fbe104ed685130700bbcbad971c3a8cfa7eae38467e11e942f13d5cc99557b59c091487
-
SSDEEP
49152:V41Z+bBFn6j+a6d0YqJ3/yB0wj+q0JhU1lEl9lCi3xM69us6GCVYhi8:VWcuCa6dX+3/yBP+thU1elDj3996R+9
Score7/10-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Reads the contacts stored on the device.
-
Reads the content of outgoing SMS messages.
-
Queries information about active data network
-
Reads information about phone network operator.
-