General
-
Target
68de920817f62d2a44345cdba2455342_JaffaCakes118
-
Size
11.9MB
-
Sample
240522-2j96tabf87
-
MD5
68de920817f62d2a44345cdba2455342
-
SHA1
7c52d17e1d2e68523c37c1b9c7ff502668042b0e
-
SHA256
1649c74110a7a6a126a305b73184062468e82c2bc68bac63c26a0f54ff3602a9
-
SHA512
18b9a3f9888e004781ceebb08fd2974a4dd0935e09bcb93adfd15a412259baaf5f9ade43d385d65301c0361fd8d3850b56d35cdbd710a5d751d54153b0aada2f
-
SSDEEP
196608:Mnj6Pt0zkHyZRX4fmgwXszMZkKFp1dl8eFLQbj7fAqelxogQqR535P5ajuqBv:Ij6PtPHyZ5BgwczHAdbLQcoGXabBv
Static task
static1
Behavioral task
behavioral1
Sample
68de920817f62d2a44345cdba2455342_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
68de920817f62d2a44345cdba2455342_JaffaCakes118
-
Size
11.9MB
-
MD5
68de920817f62d2a44345cdba2455342
-
SHA1
7c52d17e1d2e68523c37c1b9c7ff502668042b0e
-
SHA256
1649c74110a7a6a126a305b73184062468e82c2bc68bac63c26a0f54ff3602a9
-
SHA512
18b9a3f9888e004781ceebb08fd2974a4dd0935e09bcb93adfd15a412259baaf5f9ade43d385d65301c0361fd8d3850b56d35cdbd710a5d751d54153b0aada2f
-
SSDEEP
196608:Mnj6Pt0zkHyZRX4fmgwXszMZkKFp1dl8eFLQbj7fAqelxogQqR535P5ajuqBv:Ij6PtPHyZ5BgwczHAdbLQcoGXabBv
Score8/10-
Checks if the Android device is rooted.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-