General
-
Target
1c8db7b318eb029ceae3b16b3c892713_JaffaCakes118
-
Size
16.9MB
-
Sample
240701-1abq8avarl
-
MD5
1c8db7b318eb029ceae3b16b3c892713
-
SHA1
4e6328f2d69e59d876a9eb1a5abd2a99a2e3ae3a
-
SHA256
b55e868e735d9c0fa14a8de269d5da523c5859162f66c6063de0bc86a2a2b5c1
-
SHA512
efefebd4a1b6d08ed9f53db0a32c78483720d99c487ae45bef630556da1181ad2a2ec6ce95fac39d1340d41bbf54d373b70a43eabfe098405f3133f58434630e
-
SSDEEP
393216:PbQieqGclK8ofDCGHL2pLCcHyuHG3ZwCGGZ0CucY/5HevQa:PM7q7OL8WcHjGpwcZ0CuclJ
Static task
static1
Behavioral task
behavioral1
Sample
1c8db7b318eb029ceae3b16b3c892713_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
1c8db7b318eb029ceae3b16b3c892713_JaffaCakes118.apk
Resource
android-x64-20240624-en
Malware Config
Targets
-
-
Target
1c8db7b318eb029ceae3b16b3c892713_JaffaCakes118
-
Size
16.9MB
-
MD5
1c8db7b318eb029ceae3b16b3c892713
-
SHA1
4e6328f2d69e59d876a9eb1a5abd2a99a2e3ae3a
-
SHA256
b55e868e735d9c0fa14a8de269d5da523c5859162f66c6063de0bc86a2a2b5c1
-
SHA512
efefebd4a1b6d08ed9f53db0a32c78483720d99c487ae45bef630556da1181ad2a2ec6ce95fac39d1340d41bbf54d373b70a43eabfe098405f3133f58434630e
-
SSDEEP
393216:PbQieqGclK8ofDCGHL2pLCcHyuHG3ZwCGGZ0CucY/5HevQa:PM7q7OL8WcHjGpwcZ0CuclJ
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Listens for changes in the sensor environment (might be used to detect emulation)
-