General
-
Target
6331f5c84fe283f7baf4cfe1fe5ac433_JaffaCakes118
-
Size
21.3MB
-
Sample
240521-n2dnnscf8z
-
MD5
6331f5c84fe283f7baf4cfe1fe5ac433
-
SHA1
1de3f20bc7f7849da8b5c7eac4f59ccdca48ee90
-
SHA256
bc3a617f74196d909933383609a20e7696277c851024bd6af48b4e95ea2d32b0
-
SHA512
89fefee26c9d5494078b7516a9c67f3b51c1f28e8992004d76bc29eb351cb50c77d995c353e9e31ceefe8a2f95ae2453e8f59afa6d26a674805e5a0f4ef77a42
-
SSDEEP
393216:jQ0LWU9qM9plIYmcio52XKGuL71Sr32bUPrtr68YjycHCCIVLuxR4:jd/qM98ctGRcST2bUjtWUgct
Static task
static1
Behavioral task
behavioral1
Sample
6331f5c84fe283f7baf4cfe1fe5ac433_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
6331f5c84fe283f7baf4cfe1fe5ac433_JaffaCakes118.apk
Resource
android-x64-20240514-en
Malware Config
Targets
-
-
Target
6331f5c84fe283f7baf4cfe1fe5ac433_JaffaCakes118
-
Size
21.3MB
-
MD5
6331f5c84fe283f7baf4cfe1fe5ac433
-
SHA1
1de3f20bc7f7849da8b5c7eac4f59ccdca48ee90
-
SHA256
bc3a617f74196d909933383609a20e7696277c851024bd6af48b4e95ea2d32b0
-
SHA512
89fefee26c9d5494078b7516a9c67f3b51c1f28e8992004d76bc29eb351cb50c77d995c353e9e31ceefe8a2f95ae2453e8f59afa6d26a674805e5a0f4ef77a42
-
SSDEEP
393216:jQ0LWU9qM9plIYmcio52XKGuL71Sr32bUPrtr68YjycHCCIVLuxR4:jd/qM98ctGRcST2bUjtWUgct
Score8/10-
Checks if the Android device is rooted.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Queries the unique device ID (IMEI, MEID, IMSI)
-