General
-
Target
4d39cb3529ec04937cfbf46e7c0c31cc_JaffaCakes118
-
Size
12.7MB
-
Sample
240516-1xre7aaf3z
-
MD5
4d39cb3529ec04937cfbf46e7c0c31cc
-
SHA1
71061aeedb8151e0aef99cc5fcfb64b36b10cc3b
-
SHA256
d0debb77b61e1541758ff75a047a870e936b79d3eacca58b4bb568a21fddd633
-
SHA512
5cfe9b676900a09c02068366309034369b129c7ab613fd15cffb9655e4e02a25da0391b8e48c267bba1201ac07e6ca34be629c575993c9e1bf1644eb1b718d84
-
SSDEEP
393216:znmj96gvcEGhcNUkcHAepWpGSHK4cZR7NpwtrbR8oq:rU96gvciNUkFEWpPK4cFpWdq
Static task
static1
Behavioral task
behavioral1
Sample
4d39cb3529ec04937cfbf46e7c0c31cc_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
gdtadv2.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
4d39cb3529ec04937cfbf46e7c0c31cc_JaffaCakes118
-
Size
12.7MB
-
MD5
4d39cb3529ec04937cfbf46e7c0c31cc
-
SHA1
71061aeedb8151e0aef99cc5fcfb64b36b10cc3b
-
SHA256
d0debb77b61e1541758ff75a047a870e936b79d3eacca58b4bb568a21fddd633
-
SHA512
5cfe9b676900a09c02068366309034369b129c7ab613fd15cffb9655e4e02a25da0391b8e48c267bba1201ac07e6ca34be629c575993c9e1bf1644eb1b718d84
-
SSDEEP
393216:znmj96gvcEGhcNUkcHAepWpGSHK4cZR7NpwtrbR8oq:rU96gvciNUkFEWpPK4cFpWdq
Score8/10-
Checks if the Android device is rooted.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
-
-
Target
gdtadv2.jar
-
Size
392KB
-
MD5
79ba72e5378871bcfcf1e67e7698c5ca
-
SHA1
6e372352cc9e3c9511f34b048458db9caf128c42
-
SHA256
9f2b529d9767174a1277bdf85432d7a6d53a3e442f84fb490380ef38e1aa6855
-
SHA512
3a299f4886a433b3bc9092c1b2aa6a1268480548899b1abba060a8d99ba709b431384b33a09f7e52fd3a767f5bde8b3d81622f677e8c5a6767cae769889a9a93
-
SSDEEP
12288:DuOm8JwGzi1eQUSvCm0YsSVP1BO02WOz6e:SthU6Cm0EP14dzN
Score1/10 -