General
-
Target
627aad378256719d1898e841f6677b27_JaffaCakes118
-
Size
17.9MB
-
Sample
240521-h54flsch4t
-
MD5
627aad378256719d1898e841f6677b27
-
SHA1
917bb018a619b2b85c4c9b681347643f6d6a2e08
-
SHA256
44911daf3d8f34b7f49079ed7c61591da3478a8f4361eeba9f6651652a9f321e
-
SHA512
3060689d3ec0ac1f909c7a1db71376ccb0b3c2a1449d21cf2391b0cadba7cda4d89d2a467e2df34a14cd9cf5d037aa11d012441ff1fdcf7c1fa4b1bff0dde9ad
-
SSDEEP
393216:hm8Qo8W+9U1X2iksOOUD0v31YnfUdS29wMM1dMkfP8rqrKk5VpptZbahStboIcLu:g28pGX2TsOqPSfsr99NrqOetpahSxoI5
Static task
static1
Behavioral task
behavioral1
Sample
627aad378256719d1898e841f6677b27_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
627aad378256719d1898e841f6677b27_JaffaCakes118
-
Size
17.9MB
-
MD5
627aad378256719d1898e841f6677b27
-
SHA1
917bb018a619b2b85c4c9b681347643f6d6a2e08
-
SHA256
44911daf3d8f34b7f49079ed7c61591da3478a8f4361eeba9f6651652a9f321e
-
SHA512
3060689d3ec0ac1f909c7a1db71376ccb0b3c2a1449d21cf2391b0cadba7cda4d89d2a467e2df34a14cd9cf5d037aa11d012441ff1fdcf7c1fa4b1bff0dde9ad
-
SSDEEP
393216:hm8Qo8W+9U1X2iksOOUD0v31YnfUdS29wMM1dMkfP8rqrKk5VpptZbahStboIcLu:g28pGX2TsOqPSfsr99NrqOetpahSxoI5
Score8/10-
Checks if the Android device is rooted.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-