General
-
Target
659985f5f6e1a3108e335a2966087ff3_JaffaCakes118
-
Size
9.7MB
-
Sample
240522-cb3pbsgf53
-
MD5
659985f5f6e1a3108e335a2966087ff3
-
SHA1
e7935a245ec44e9cc0ffb715917f0b7cefa8a1d0
-
SHA256
647cd8512704a0053c14024747e97fffd9665d9dbd42d02cc913d252412be54f
-
SHA512
8003ab4a64457ff2b929c6b0dbca28088028dd029e9cd55ad05a79020bfc94b95221cdfb34ef143965936137a997e0cb9f325f32493a6de1f23634be7db1ce99
-
SSDEEP
196608:G5SsgzlfG9z2e0kDNchz108HMewB5LJ3TlA29HyzWz2g9EY46jUuV:dsQlf8jDN+aJewBlJK29yzWz2ZT6j9V
Static task
static1
Behavioral task
behavioral1
Sample
659985f5f6e1a3108e335a2966087ff3_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
659985f5f6e1a3108e335a2966087ff3_JaffaCakes118
-
Size
9.7MB
-
MD5
659985f5f6e1a3108e335a2966087ff3
-
SHA1
e7935a245ec44e9cc0ffb715917f0b7cefa8a1d0
-
SHA256
647cd8512704a0053c14024747e97fffd9665d9dbd42d02cc913d252412be54f
-
SHA512
8003ab4a64457ff2b929c6b0dbca28088028dd029e9cd55ad05a79020bfc94b95221cdfb34ef143965936137a997e0cb9f325f32493a6de1f23634be7db1ce99
-
SSDEEP
196608:G5SsgzlfG9z2e0kDNchz108HMewB5LJ3TlA29HyzWz2g9EY46jUuV:dsQlf8jDN+aJewBlJK29yzWz2ZT6j9V
Score8/10-
Checks if the Android device is rooted.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-