General
-
Target
54550d15f25fcebb0b47217341c0ae71_JaffaCakes118
-
Size
18.1MB
-
Sample
240518-mzg3msga21
-
MD5
54550d15f25fcebb0b47217341c0ae71
-
SHA1
b85ce95328a267b58b754f9e1f5bc54f4b669859
-
SHA256
423a5f8908c0e8eda026ee9e9f2c58c0281c915ece391d0d80323ae1eaf4e420
-
SHA512
a75ad046212d296eac3225f050ff199b9a0cc21a7a2aa93a6aac8e0b9a3007901853cccdbffae1f9fad7a49b19a1894985ad3bed754773eab38e2914f508fe50
-
SSDEEP
393216:2mzKrCWTwX0BJ0MP1u3Qax2YVaw/+MssMS2yuUu0IPnfJj6t22:2mz+CoBJmGYVId30YfhUB
Static task
static1
Behavioral task
behavioral1
Sample
54550d15f25fcebb0b47217341c0ae71_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
54550d15f25fcebb0b47217341c0ae71_JaffaCakes118.apk
Resource
android-x64-20240514-en
Malware Config
Targets
-
-
Target
54550d15f25fcebb0b47217341c0ae71_JaffaCakes118
-
Size
18.1MB
-
MD5
54550d15f25fcebb0b47217341c0ae71
-
SHA1
b85ce95328a267b58b754f9e1f5bc54f4b669859
-
SHA256
423a5f8908c0e8eda026ee9e9f2c58c0281c915ece391d0d80323ae1eaf4e420
-
SHA512
a75ad046212d296eac3225f050ff199b9a0cc21a7a2aa93a6aac8e0b9a3007901853cccdbffae1f9fad7a49b19a1894985ad3bed754773eab38e2914f508fe50
-
SSDEEP
393216:2mzKrCWTwX0BJ0MP1u3Qax2YVaw/+MssMS2yuUu0IPnfJj6t22:2mz+CoBJmGYVId30YfhUB
Score8/10-
Checks if the Android device is rooted.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Queries the unique device ID (IMEI, MEID, IMSI)
-