General
-
Target
68dbfd5580bc122f788709cf968b827d_JaffaCakes118
-
Size
13.5MB
-
Sample
240522-2fzkxabd61
-
MD5
68dbfd5580bc122f788709cf968b827d
-
SHA1
0aba5ac58b47a172095f15874cf4c0a3e3f4bc92
-
SHA256
adb20681f004782f00bf9366053086b5cabe0dbebcc38c5517645b0fc1f3cabe
-
SHA512
3b861d073d68a4d2460534847f9545a4c72101fa25c848d5282607ae7e03906cfbbf6b9f671ab2ccfda9822d8aeb22608b242283713d7dea93d0f866dbfa36ab
-
SSDEEP
196608:XOVOWT6pkvaep1HxoNJXKv5FZs9Mipw1/mJQsmzJxzOLq0GchPjQ4llyJ0BsCcoK:ettZHx4csMkJMzigchNllrsCcgaB
Static task
static1
Behavioral task
behavioral1
Sample
68dbfd5580bc122f788709cf968b827d_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
68dbfd5580bc122f788709cf968b827d_JaffaCakes118
-
Size
13.5MB
-
MD5
68dbfd5580bc122f788709cf968b827d
-
SHA1
0aba5ac58b47a172095f15874cf4c0a3e3f4bc92
-
SHA256
adb20681f004782f00bf9366053086b5cabe0dbebcc38c5517645b0fc1f3cabe
-
SHA512
3b861d073d68a4d2460534847f9545a4c72101fa25c848d5282607ae7e03906cfbbf6b9f671ab2ccfda9822d8aeb22608b242283713d7dea93d0f866dbfa36ab
-
SSDEEP
196608:XOVOWT6pkvaep1HxoNJXKv5FZs9Mipw1/mJQsmzJxzOLq0GchPjQ4llyJ0BsCcoK:ettZHx4csMkJMzigchNllrsCcgaB
Score8/10-
Checks if the Android device is rooted.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-