General
-
Target
58eb733a1c6617149cc38d3b058d2291_JaffaCakes118
-
Size
20.2MB
-
Sample
240519-gt67padg6z
-
MD5
58eb733a1c6617149cc38d3b058d2291
-
SHA1
59aef527c89ad9d570059c9aa20f4a29f6fc789f
-
SHA256
29927b7f682e953759f1e47aef8fffcc181e512ce52a75427582532126039808
-
SHA512
7089ebc7d48471551e9bfb699ba6dee3eedade50db8d4a1ddcfc9d716a8243a4f7b53ad9dda6e65fda0b7a28a0eaf61e6d277dc8c177189a18a3bbe80bd29450
-
SSDEEP
393216:mgGUl0cOZxgNJpIP+Nk8cM8mGnxU+hZSEZJ2QAb/Jyf1bHmafocfGndgxrXBn:m9m/8gNJpk+NsM8HxU+hZSEZ+Y1yafos
Static task
static1
Behavioral task
behavioral1
Sample
58eb733a1c6617149cc38d3b058d2291_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
58eb733a1c6617149cc38d3b058d2291_JaffaCakes118
-
Size
20.2MB
-
MD5
58eb733a1c6617149cc38d3b058d2291
-
SHA1
59aef527c89ad9d570059c9aa20f4a29f6fc789f
-
SHA256
29927b7f682e953759f1e47aef8fffcc181e512ce52a75427582532126039808
-
SHA512
7089ebc7d48471551e9bfb699ba6dee3eedade50db8d4a1ddcfc9d716a8243a4f7b53ad9dda6e65fda0b7a28a0eaf61e6d277dc8c177189a18a3bbe80bd29450
-
SSDEEP
393216:mgGUl0cOZxgNJpIP+Nk8cM8mGnxU+hZSEZJ2QAb/Jyf1bHmafocfGndgxrXBn:m9m/8gNJpk+NsM8HxU+hZSEZ+Y1yafos
Score8/10-
Checks if the Android device is rooted.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-