General
-
Target
534623173fb171825fe00a45a311f8af_JaffaCakes118
-
Size
6.4MB
-
Sample
240518-gnvayaef9x
-
MD5
534623173fb171825fe00a45a311f8af
-
SHA1
f264c2e77403be4b091c1ff9ab38f947b1d4951a
-
SHA256
a273b1dfa83f97354966ce74ba780b6e8d93a4ba23d73334c7f4ee35673b2074
-
SHA512
109e4a3b57149c5bd2447f8cf22b53a84683801357a72b7a3c4dd4b8c9f7de4d7519235714edcc3c92b3131bb6c63ca6c44d1d09097ee0ae69b27c43c03aad42
-
SSDEEP
196608:E4xotv3Jt+M/+ZVuT7IoeF+5XrqhYgeD8SJ02:E4Sv3z+MW+Je91I
Static task
static1
Behavioral task
behavioral1
Sample
534623173fb171825fe00a45a311f8af_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
534623173fb171825fe00a45a311f8af_JaffaCakes118
-
Size
6.4MB
-
MD5
534623173fb171825fe00a45a311f8af
-
SHA1
f264c2e77403be4b091c1ff9ab38f947b1d4951a
-
SHA256
a273b1dfa83f97354966ce74ba780b6e8d93a4ba23d73334c7f4ee35673b2074
-
SHA512
109e4a3b57149c5bd2447f8cf22b53a84683801357a72b7a3c4dd4b8c9f7de4d7519235714edcc3c92b3131bb6c63ca6c44d1d09097ee0ae69b27c43c03aad42
-
SSDEEP
196608:E4xotv3Jt+M/+ZVuT7IoeF+5XrqhYgeD8SJ02:E4Sv3z+MW+Je91I
Score8/10-
Checks if the Android device is rooted.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-