General
-
Target
63e0aafdcd546b0b750e478a1ce76a8e_JaffaCakes118
-
Size
30.2MB
-
Sample
240521-te38psbb28
-
MD5
63e0aafdcd546b0b750e478a1ce76a8e
-
SHA1
729dbf1f49b6897138aa3c4e88f32f7701c301f2
-
SHA256
5f25694a84dd08b7f941c395b840ea6eed8442043d142e006f948be68b597780
-
SHA512
031de36abce47d9464bb6e455797b3ae74b18b32c70d0f6ff6e347952ab5c6a0c5cf6510e94ab4aca718fb53225f77c0701e82f422ab42d08d8b0f49275f9918
-
SSDEEP
786432:lMcSDzUJRLcpAqCer9jIGRclvhkWkHzLT0Crsj72s+9P1V3gBY6Mmi6:lS0gxrx5aoWqrm2FP18Y6M6
Static task
static1
Behavioral task
behavioral1
Sample
63e0aafdcd546b0b750e478a1ce76a8e_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
63e0aafdcd546b0b750e478a1ce76a8e_JaffaCakes118
-
Size
30.2MB
-
MD5
63e0aafdcd546b0b750e478a1ce76a8e
-
SHA1
729dbf1f49b6897138aa3c4e88f32f7701c301f2
-
SHA256
5f25694a84dd08b7f941c395b840ea6eed8442043d142e006f948be68b597780
-
SHA512
031de36abce47d9464bb6e455797b3ae74b18b32c70d0f6ff6e347952ab5c6a0c5cf6510e94ab4aca718fb53225f77c0701e82f422ab42d08d8b0f49275f9918
-
SSDEEP
786432:lMcSDzUJRLcpAqCer9jIGRclvhkWkHzLT0Crsj72s+9P1V3gBY6Mmi6:lS0gxrx5aoWqrm2FP18Y6M6
Score8/10-
Checks if the Android device is rooted.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Reads information about phone network operator.
-