General
-
Target
58496d609aef5bfb91e9166549b14c10_JaffaCakes118
-
Size
829KB
-
Sample
240519-dr36gafe8t
-
MD5
58496d609aef5bfb91e9166549b14c10
-
SHA1
778bf12c023ff7dbc6444e1e43333391cfee61dd
-
SHA256
f898a13b103f5207ec69aec332ad1aaaaca4c7fd4f9c06b6aec80dda1030d107
-
SHA512
f20979bc1970ac915bbe0ebc10f786741b0b7bc0d9a6d926383ea5aea0197db35398498f56c0a4dc855a103d662d770f2f53124b339a58e814645e62601e978f
-
SSDEEP
12288:WW6wgK81aVM5HxMvyQU78vZjrGMudjFXrzgsbsKkoVKvMbwaXEH0Y+YP3v2+GC4M:WNwvVMxxHy2RP7EswxvrUY3f2+cr5f2
Static task
static1
Behavioral task
behavioral1
Sample
58496d609aef5bfb91e9166549b14c10_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
58496d609aef5bfb91e9166549b14c10_JaffaCakes118
-
Size
829KB
-
MD5
58496d609aef5bfb91e9166549b14c10
-
SHA1
778bf12c023ff7dbc6444e1e43333391cfee61dd
-
SHA256
f898a13b103f5207ec69aec332ad1aaaaca4c7fd4f9c06b6aec80dda1030d107
-
SHA512
f20979bc1970ac915bbe0ebc10f786741b0b7bc0d9a6d926383ea5aea0197db35398498f56c0a4dc855a103d662d770f2f53124b339a58e814645e62601e978f
-
SSDEEP
12288:WW6wgK81aVM5HxMvyQU78vZjrGMudjFXrzgsbsKkoVKvMbwaXEH0Y+YP3v2+GC4M:WNwvVMxxHy2RP7EswxvrUY3f2+cr5f2
Score8/10-
Checks if the Android device is rooted.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-