General
-
Target
610388df0b36470f51fa99041964e90a_JaffaCakes118
-
Size
9.9MB
-
Sample
240520-y5qgrafg35
-
MD5
610388df0b36470f51fa99041964e90a
-
SHA1
0aec549fff178553781b57046edd93436764fe47
-
SHA256
a76e6fe207dc4235bda4933373150af2b9b21b0cac4d28ca05ff5f3aa6e433ea
-
SHA512
5d0b1dd1dbfbd9325d97cef341b99cda8eaaf9a570edeb11cc0134322632a3ed6cc649a8ead4d71736e23f017722db9997766ff3b540def3108ceac1dc1b60cd
-
SSDEEP
196608:HrFTQs+NHa9rItuo69OyUnQg7iHa+fxL0cFT38orsXunrEmi6Gzo0Ke3brp:J59EcfwyU/+dfW+nrEmpXe3J
Static task
static1
Behavioral task
behavioral1
Sample
610388df0b36470f51fa99041964e90a_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
610388df0b36470f51fa99041964e90a_JaffaCakes118
-
Size
9.9MB
-
MD5
610388df0b36470f51fa99041964e90a
-
SHA1
0aec549fff178553781b57046edd93436764fe47
-
SHA256
a76e6fe207dc4235bda4933373150af2b9b21b0cac4d28ca05ff5f3aa6e433ea
-
SHA512
5d0b1dd1dbfbd9325d97cef341b99cda8eaaf9a570edeb11cc0134322632a3ed6cc649a8ead4d71736e23f017722db9997766ff3b540def3108ceac1dc1b60cd
-
SSDEEP
196608:HrFTQs+NHa9rItuo69OyUnQg7iHa+fxL0cFT38orsXunrEmi6Gzo0Ke3brp:J59EcfwyU/+dfW+nrEmpXe3J
Score8/10-
Checks if the Android device is rooted.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-