General
-
Target
ea3a33cdd084eea796816fbf477f533f_JaffaCakes118
-
Size
1.4MB
-
Sample
241213-gqyfdasjhq
-
MD5
ea3a33cdd084eea796816fbf477f533f
-
SHA1
08bc369c7de4ea4732226797bba80fb1b5842e2c
-
SHA256
704b3669bf3eb8c365702cddb66d9c10688f1d8115f98dc0e5d16396c33b6b6c
-
SHA512
37382465e1273421781065d4d7bb075a91d98cd962eb2e426fb2907eeebe93659c813e8bb6b8dc1443ebc298be8b2fec10ace572daf2556308c1dad4da4b01e3
-
SSDEEP
24576:/awgIRKrKr9F+tjq/qKld+EMphtlFZOPt6VcayYGJUTuTqCUsQQDO5SNxqZ:/awhQp9q/jldPMphtlFY16VikooQC5Sc
Behavioral task
behavioral1
Sample
ea3a33cdd084eea796816fbf477f533f_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Malware Config
Targets
-
-
Target
ea3a33cdd084eea796816fbf477f533f_JaffaCakes118
-
Size
1.4MB
-
MD5
ea3a33cdd084eea796816fbf477f533f
-
SHA1
08bc369c7de4ea4732226797bba80fb1b5842e2c
-
SHA256
704b3669bf3eb8c365702cddb66d9c10688f1d8115f98dc0e5d16396c33b6b6c
-
SHA512
37382465e1273421781065d4d7bb075a91d98cd962eb2e426fb2907eeebe93659c813e8bb6b8dc1443ebc298be8b2fec10ace572daf2556308c1dad4da4b01e3
-
SSDEEP
24576:/awgIRKrKr9F+tjq/qKld+EMphtlFZOPt6VcayYGJUTuTqCUsQQDO5SNxqZ:/awhQp9q/jldPMphtlFY16VikooQC5Sc
Score7/10-
Checks Android system properties for emulator presence.
-
Queries the phone number (MSISDN for GSM devices)
-
Reads the content of SMS inbox messages.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-