General
-
Target
65b755e72550bb880a4f9c718b17352a_JaffaCakes118
-
Size
2.9MB
-
Sample
240522-c3xmdshf44
-
MD5
65b755e72550bb880a4f9c718b17352a
-
SHA1
e5a925e84d648bf9656402aeefa91ffb33ebbc9c
-
SHA256
03d5d9906a262608c7ed8bbe5992f4746396894883beeb1f80e4dfa9d3683e4b
-
SHA512
77005b8e1794ecd83775fcf51bb7d02ddc6540021400a52949a34ea20ab2cf0fbeeb34532eebcb520519d3253b5cf1aec0c06df630db9d299d0b7961386a8e73
-
SSDEEP
49152:qI4vM4aV0NRSZgrsmGuunLlsfRud6WGc+q0K7ONALHdVQBnVNQqmS5:Z2YW7wuunLls8dZGduTfoVVR
Static task
static1
Behavioral task
behavioral1
Sample
65b755e72550bb880a4f9c718b17352a_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
65b755e72550bb880a4f9c718b17352a_JaffaCakes118.apk
Resource
android-33-x64-arm64-20240514-en
Malware Config
Targets
-
-
Target
65b755e72550bb880a4f9c718b17352a_JaffaCakes118
-
Size
2.9MB
-
MD5
65b755e72550bb880a4f9c718b17352a
-
SHA1
e5a925e84d648bf9656402aeefa91ffb33ebbc9c
-
SHA256
03d5d9906a262608c7ed8bbe5992f4746396894883beeb1f80e4dfa9d3683e4b
-
SHA512
77005b8e1794ecd83775fcf51bb7d02ddc6540021400a52949a34ea20ab2cf0fbeeb34532eebcb520519d3253b5cf1aec0c06df630db9d299d0b7961386a8e73
-
SSDEEP
49152:qI4vM4aV0NRSZgrsmGuunLlsfRud6WGc+q0K7ONALHdVQBnVNQqmS5:Z2YW7wuunLls8dZGduTfoVVR
Score8/10-
Checks if the Android device is rooted.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Reads information about phone network operator.
-