General
-
Target
534674063f2620470bdcf5836e6514af_JaffaCakes118
-
Size
10.3MB
-
Sample
240518-gn2d9aeg34
-
MD5
534674063f2620470bdcf5836e6514af
-
SHA1
654019291e504a352d3f1908b66649a9781f3e80
-
SHA256
b8059c610fbcd50b038bdbc0d207243deb6255bb8f09020a0acc06c9d237550b
-
SHA512
efd6e9745e01e258b748f48b3703f3c4aaa417469a932d679bf2962963d0268d4db9b3aa69e1a6e6ad031d29d65ca6e378eb55e2627bc7a7e625618bdb5d129e
-
SSDEEP
196608:Vw23XnFZkhXPfaryKxUJlvIK1rRUFA11etSwbY3rBqD3PauNXGipcEbLmLECQUm9:Vw23XnFCh6GKCwK1rP11fKY9qDvBvmLM
Static task
static1
Behavioral task
behavioral1
Sample
534674063f2620470bdcf5836e6514af_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
534674063f2620470bdcf5836e6514af_JaffaCakes118.apk
Resource
android-x64-20240514-en
Malware Config
Targets
-
-
Target
534674063f2620470bdcf5836e6514af_JaffaCakes118
-
Size
10.3MB
-
MD5
534674063f2620470bdcf5836e6514af
-
SHA1
654019291e504a352d3f1908b66649a9781f3e80
-
SHA256
b8059c610fbcd50b038bdbc0d207243deb6255bb8f09020a0acc06c9d237550b
-
SHA512
efd6e9745e01e258b748f48b3703f3c4aaa417469a932d679bf2962963d0268d4db9b3aa69e1a6e6ad031d29d65ca6e378eb55e2627bc7a7e625618bdb5d129e
-
SSDEEP
196608:Vw23XnFZkhXPfaryKxUJlvIK1rRUFA11etSwbY3rBqD3PauNXGipcEbLmLECQUm9:Vw23XnFCh6GKCwK1rP11fKY9qDvBvmLM
Score8/10-
Checks if the Android device is rooted.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Queries the unique device ID (IMEI, MEID, IMSI)
-