General
-
Target
560f907dc5cf78266ad3e0e50464dbf8_JaffaCakes118
-
Size
6.1MB
-
Sample
240518-wkj35agc32
-
MD5
560f907dc5cf78266ad3e0e50464dbf8
-
SHA1
27d98cbf54ac94d86ecfe09219723aeecfbc09b7
-
SHA256
bb39ac9f93aa822397d7774e9dff23b017361d8a85f6c122c8b72c500abab490
-
SHA512
b66926fa8ff5dacdca5452a3a8a8d19cc790f4c929c1fffa5d43a17c9b55c52aad84bcb933a6481e1355c84e29d113a2a2db9081a69ff42f5e09fb69ead265f8
-
SSDEEP
196608:Y9EaTHj10wjisJFN7R8VaUmLgnWWqFo7bMblgfqm/wb+:Y9Ea7R0wJFdeVaxgnqighOm+
Static task
static1
Behavioral task
behavioral1
Sample
560f907dc5cf78266ad3e0e50464dbf8_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
560f907dc5cf78266ad3e0e50464dbf8_JaffaCakes118.apk
Resource
android-x64-20240514-en
Malware Config
Targets
-
-
Target
560f907dc5cf78266ad3e0e50464dbf8_JaffaCakes118
-
Size
6.1MB
-
MD5
560f907dc5cf78266ad3e0e50464dbf8
-
SHA1
27d98cbf54ac94d86ecfe09219723aeecfbc09b7
-
SHA256
bb39ac9f93aa822397d7774e9dff23b017361d8a85f6c122c8b72c500abab490
-
SHA512
b66926fa8ff5dacdca5452a3a8a8d19cc790f4c929c1fffa5d43a17c9b55c52aad84bcb933a6481e1355c84e29d113a2a2db9081a69ff42f5e09fb69ead265f8
-
SSDEEP
196608:Y9EaTHj10wjisJFN7R8VaUmLgnWWqFo7bMblgfqm/wb+:Y9Ea7R0wJFdeVaxgnqighOm+
Score8/10-
Checks if the Android device is rooted.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Queries the unique device ID (IMEI, MEID, IMSI)
-