General
-
Target
661e55e6279f2922681964363f47b6f4_JaffaCakes118
-
Size
18.9MB
-
Sample
240522-fw4c5sdc2x
-
MD5
661e55e6279f2922681964363f47b6f4
-
SHA1
c8e3e7e15f35d7bc495e861f7aff341d9047a184
-
SHA256
e73e09ed27a025e3f165a420fea3b42c866a922e4853eb8c0f96290c167a3e76
-
SHA512
5101e7ea1682a4c3c134588d34f7a5b3ec84bffc872b7a3b424b4cd64c576ecb091abad876fc5cae4a3ce301046fb907f88196c629550287a6bb717ad600c385
-
SSDEEP
393216:bCzMzYY7HaUYB1WauGmLFOx2KtDEngH5ehZssT/:bw86UYXN9tIngH5msC
Static task
static1
Behavioral task
behavioral1
Sample
661e55e6279f2922681964363f47b6f4_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
661e55e6279f2922681964363f47b6f4_JaffaCakes118
-
Size
18.9MB
-
MD5
661e55e6279f2922681964363f47b6f4
-
SHA1
c8e3e7e15f35d7bc495e861f7aff341d9047a184
-
SHA256
e73e09ed27a025e3f165a420fea3b42c866a922e4853eb8c0f96290c167a3e76
-
SHA512
5101e7ea1682a4c3c134588d34f7a5b3ec84bffc872b7a3b424b4cd64c576ecb091abad876fc5cae4a3ce301046fb907f88196c629550287a6bb717ad600c385
-
SSDEEP
393216:bCzMzYY7HaUYB1WauGmLFOx2KtDEngH5ehZssT/:bw86UYXN9tIngH5msC
Score8/10-
Checks if the Android device is rooted.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-