General
-
Target
586198a6b19e5c527315e0457c60c35a_JaffaCakes118
-
Size
22.4MB
-
Sample
240519-d86mxsgh65
-
MD5
586198a6b19e5c527315e0457c60c35a
-
SHA1
8ba448c59c2bfc6074abe58d316c160b51b1d44b
-
SHA256
65b89474840500fa9b811b5f0dbf1580df34884322203b21238b86b11d35d25a
-
SHA512
55a0ade5710af88f1a8aafeb4ae3fe42af817cf717d1f8c5ac2e18eac2d0a95c662b2c6001d98fefeb591f1c2679c7c8eb7b157330b9754337c0d7a6cb48653b
-
SSDEEP
393216:hXMWPaDDCxfUbPE6u6T656X6E6s6I6D6u6H4r0RaKOt5u83AscrnFmT8zgvkfprf:hX3PanWUDTRajt5u8TcBckfNWGTMxax
Static task
static1
Behavioral task
behavioral1
Sample
586198a6b19e5c527315e0457c60c35a_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
586198a6b19e5c527315e0457c60c35a_JaffaCakes118
-
Size
22.4MB
-
MD5
586198a6b19e5c527315e0457c60c35a
-
SHA1
8ba448c59c2bfc6074abe58d316c160b51b1d44b
-
SHA256
65b89474840500fa9b811b5f0dbf1580df34884322203b21238b86b11d35d25a
-
SHA512
55a0ade5710af88f1a8aafeb4ae3fe42af817cf717d1f8c5ac2e18eac2d0a95c662b2c6001d98fefeb591f1c2679c7c8eb7b157330b9754337c0d7a6cb48653b
-
SSDEEP
393216:hXMWPaDDCxfUbPE6u6T656X6E6s6I6D6u6H4r0RaKOt5u83AscrnFmT8zgvkfprf:hX3PanWUDTRajt5u8TcBckfNWGTMxax
Score1/10 -
-
-
Target
GameBox.jpg
-
Size
3.7MB
-
MD5
44ae19ad231ffee36e080a6d7b75a12b
-
SHA1
18381661d6f04afd0f02bf760d461948e046d6f0
-
SHA256
cdefcb3efd017c38ab8ac090ae11990fd098c36d444c1f6f5cc9bd8c481eb699
-
SHA512
0b3f170fb038300f2688f872a2ce8149134309c89e1401ba65693c2bb88db8b9f6cecb3c35890f07b6e931816761a79f65d6489452482f71e9114d8cbc461c75
-
SSDEEP
98304:JzA+a9OXEDMxaeE6MPKMsA6vrmwdJw9aQaUPfre050T:JzpaWZxaeEDKPAKxCILUPDPO
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Checks if the internet connection is available
-
Reads information about phone network operator.
-