General
-
Target
50398c542dab3bb43f746e8566bc1850_JaffaCakes118
-
Size
31.5MB
-
Sample
240517-s3a2dsed71
-
MD5
50398c542dab3bb43f746e8566bc1850
-
SHA1
e174dd09628913e224544de01be88876315a5be4
-
SHA256
0f1f546e1454886d73786f13f3bd64a671c07e9c289652a2ce46d9fc66584948
-
SHA512
f7e869c602867c17922e0e4b464044ec212a2616b1677a2e7c82f1de6e732cbfaddf55dbb49abc78e4d0f4353f14d0428ca0f5a1aa0126f1a835971b91521877
-
SSDEEP
786432:9Y3ELjFcbHF1d6t/pYKqpLIVXxOYKGrxCsAI:9P+rFaJpYKq+IYppt
Static task
static1
Behavioral task
behavioral1
Sample
50398c542dab3bb43f746e8566bc1850_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
50398c542dab3bb43f746e8566bc1850_JaffaCakes118.apk
Resource
android-x64-20240514-en
Malware Config
Targets
-
-
Target
50398c542dab3bb43f746e8566bc1850_JaffaCakes118
-
Size
31.5MB
-
MD5
50398c542dab3bb43f746e8566bc1850
-
SHA1
e174dd09628913e224544de01be88876315a5be4
-
SHA256
0f1f546e1454886d73786f13f3bd64a671c07e9c289652a2ce46d9fc66584948
-
SHA512
f7e869c602867c17922e0e4b464044ec212a2616b1677a2e7c82f1de6e732cbfaddf55dbb49abc78e4d0f4353f14d0428ca0f5a1aa0126f1a835971b91521877
-
SSDEEP
786432:9Y3ELjFcbHF1d6t/pYKqpLIVXxOYKGrxCsAI:9P+rFaJpYKq+IYppt
Score8/10-
Checks if the Android device is rooted.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Acquires the wake lock
-
Checks if the internet connection is available
-
Reads information about phone network operator.
-