General
-
Target
583053618f6b63c5bff31e8146c7d9e9_JaffaCakes118
-
Size
19.3MB
-
Sample
240519-das9yaeg97
-
MD5
583053618f6b63c5bff31e8146c7d9e9
-
SHA1
6e2a8850daf115c77ec2f53af0c4634f42821df9
-
SHA256
6d3ccd4539dd466385a313aa609fd5ff1e7c5ae9c350132e88b1053160ec7965
-
SHA512
da05582ec20b1f5598a873e1fe0bdc45bdb63f054cd7e9ab8aa7b86ff1c4c63141df6c34f90dbebe03aa86b618b89ce2ba9a5afccb326bac1c5b206191548a4e
-
SSDEEP
393216:WMC120xO64AVGfhZeCovXNqzzU9XLDRi1meTKaj1fWri62mD:WMC196AVGfh2vXNqzzIHeT3fWri6t
Static task
static1
Behavioral task
behavioral1
Sample
583053618f6b63c5bff31e8146c7d9e9_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
583053618f6b63c5bff31e8146c7d9e9_JaffaCakes118
-
Size
19.3MB
-
MD5
583053618f6b63c5bff31e8146c7d9e9
-
SHA1
6e2a8850daf115c77ec2f53af0c4634f42821df9
-
SHA256
6d3ccd4539dd466385a313aa609fd5ff1e7c5ae9c350132e88b1053160ec7965
-
SHA512
da05582ec20b1f5598a873e1fe0bdc45bdb63f054cd7e9ab8aa7b86ff1c4c63141df6c34f90dbebe03aa86b618b89ce2ba9a5afccb326bac1c5b206191548a4e
-
SSDEEP
393216:WMC120xO64AVGfhZeCovXNqzzU9XLDRi1meTKaj1fWri62mD:WMC196AVGfh2vXNqzzIHeT3fWri6t
Score8/10-
Checks if the Android device is rooted.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-