General
-
Target
63e431ce1a53475121e40a8fe1de4c9c_JaffaCakes118
-
Size
24.3MB
-
Sample
240521-thg5msbb93
-
MD5
63e431ce1a53475121e40a8fe1de4c9c
-
SHA1
2cbd87ad7e211fa469cf8a5a37b7d9b16851a5a3
-
SHA256
b7c2bacf4532fa476dbd96189e48edc7f55411cdc4a060d34fa41662a8a5aacc
-
SHA512
d7b827096460ee55f89537afdf467237e06c347321674be478bdc635e3b0dd1e6b9a3f8304bc0504b627e0b764c1488f212dfa3b097f7ad95bca85ea838e6cd7
-
SSDEEP
786432:fNj7sPVDkgfJUNBMjZieSwufku5VFKCwRaIk1zVDkcu6vSf:flxgakjZ/S1NwCwBk1zVDo6vSf
Static task
static1
Behavioral task
behavioral1
Sample
63e431ce1a53475121e40a8fe1de4c9c_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
63e431ce1a53475121e40a8fe1de4c9c_JaffaCakes118.apk
Resource
android-x64-20240514-en
Malware Config
Targets
-
-
Target
63e431ce1a53475121e40a8fe1de4c9c_JaffaCakes118
-
Size
24.3MB
-
MD5
63e431ce1a53475121e40a8fe1de4c9c
-
SHA1
2cbd87ad7e211fa469cf8a5a37b7d9b16851a5a3
-
SHA256
b7c2bacf4532fa476dbd96189e48edc7f55411cdc4a060d34fa41662a8a5aacc
-
SHA512
d7b827096460ee55f89537afdf467237e06c347321674be478bdc635e3b0dd1e6b9a3f8304bc0504b627e0b764c1488f212dfa3b097f7ad95bca85ea838e6cd7
-
SSDEEP
786432:fNj7sPVDkgfJUNBMjZieSwufku5VFKCwRaIk1zVDkcu6vSf:flxgakjZ/S1NwCwBk1zVDo6vSf
-
Checks if the Android device is rooted.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Checks if the internet connection is available
-
Queries the unique device ID (IMEI, MEID, IMSI)
-