General
-
Target
663d1b7e769fc3790b79737aebb96c43_JaffaCakes118
-
Size
29.8MB
-
Sample
240522-gpt2kaee2z
-
MD5
663d1b7e769fc3790b79737aebb96c43
-
SHA1
6af85a20fe22abf822b66e1477d311d936febe08
-
SHA256
8381df7f68147869dca90e1e815ed88fc60ce95595537c71a4e78e20d608fa46
-
SHA512
7d47e9803d4662d845305245e8ceb5c9fec93fdae827589d75974d5981ce2a0d8db11710410b113af812a12d74a7d076c0bb3eb13e9d8e9f5b817c5d83af3527
-
SSDEEP
786432:zf542qY2mb7SO6KsYdNuBhDBIsPZj2WTl5ZrAZQbWigEh+I9PVH:zfV/nbuO6SehD+OZjfTZA/nI9PVH
Static task
static1
Behavioral task
behavioral1
Sample
663d1b7e769fc3790b79737aebb96c43_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
663d1b7e769fc3790b79737aebb96c43_JaffaCakes118
-
Size
29.8MB
-
MD5
663d1b7e769fc3790b79737aebb96c43
-
SHA1
6af85a20fe22abf822b66e1477d311d936febe08
-
SHA256
8381df7f68147869dca90e1e815ed88fc60ce95595537c71a4e78e20d608fa46
-
SHA512
7d47e9803d4662d845305245e8ceb5c9fec93fdae827589d75974d5981ce2a0d8db11710410b113af812a12d74a7d076c0bb3eb13e9d8e9f5b817c5d83af3527
-
SSDEEP
786432:zf542qY2mb7SO6KsYdNuBhDBIsPZj2WTl5ZrAZQbWigEh+I9PVH:zfV/nbuO6SehD+OZjfTZA/nI9PVH
Score8/10-
Checks if the Android device is rooted.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-