General
-
Target
58215099cad0bd0ec85c7e3b6fa9fe5f_JaffaCakes118
-
Size
18.6MB
-
Sample
240519-c2b93aec22
-
MD5
58215099cad0bd0ec85c7e3b6fa9fe5f
-
SHA1
2d90370254859bd447f5589db66d06d44f94e553
-
SHA256
49cfd2c0926384b10cda2175dd81acedb0aacdd4eecffb2fd06451eb19cd36bc
-
SHA512
d657a1f5013f19026a991601cee4342c7d717649f5b232c54a4a22e885e3d9c8219eaee4b18b7e212701f04ba8c4645c8e782d2b6e4f3e3fa74d9ebe2ef3f610
-
SSDEEP
393216:LiC120xO6u0+ccQs5kY3ZXq94S0ld3ru8TPmeFKsa3r:LiC19sDckL3ZXq9yddTPmeFKs0
Static task
static1
Behavioral task
behavioral1
Sample
58215099cad0bd0ec85c7e3b6fa9fe5f_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
58215099cad0bd0ec85c7e3b6fa9fe5f_JaffaCakes118
-
Size
18.6MB
-
MD5
58215099cad0bd0ec85c7e3b6fa9fe5f
-
SHA1
2d90370254859bd447f5589db66d06d44f94e553
-
SHA256
49cfd2c0926384b10cda2175dd81acedb0aacdd4eecffb2fd06451eb19cd36bc
-
SHA512
d657a1f5013f19026a991601cee4342c7d717649f5b232c54a4a22e885e3d9c8219eaee4b18b7e212701f04ba8c4645c8e782d2b6e4f3e3fa74d9ebe2ef3f610
-
SSDEEP
393216:LiC120xO6u0+ccQs5kY3ZXq94S0ld3ru8TPmeFKsa3r:LiC19sDckL3ZXq9yddTPmeFKs0
Score8/10-
Checks if the Android device is rooted.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-