General
-
Target
66728d4870dcbbd23c4637aac98ba562_JaffaCakes118
-
Size
23.2MB
-
Sample
240522-h5q6aaga63
-
MD5
66728d4870dcbbd23c4637aac98ba562
-
SHA1
52030fe752292a61def4e8c48e91ae5aaac2fd62
-
SHA256
b15b1dd0217968a739ac4ab939ca96ae6a85b4f6521bdd1822ff06c5889a639c
-
SHA512
ae18b15514dab9df11cc5721b3eb6aee975acaf8400e000d6858b69a820e1738d0fec981e41ffd2ebc6c603e76305e35c620808154010d66d06046f6b0d7e6f5
-
SSDEEP
393216:HZptqx8eq8QNCae3yO9yrtXCe3YZiyf3MXJPYr+Atm89OfVJv2xjKo3cj:HBqxRlRCCyrtXCigZUX2aam8EfVJux+b
Static task
static1
Behavioral task
behavioral1
Sample
66728d4870dcbbd23c4637aac98ba562_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
66728d4870dcbbd23c4637aac98ba562_JaffaCakes118
-
Size
23.2MB
-
MD5
66728d4870dcbbd23c4637aac98ba562
-
SHA1
52030fe752292a61def4e8c48e91ae5aaac2fd62
-
SHA256
b15b1dd0217968a739ac4ab939ca96ae6a85b4f6521bdd1822ff06c5889a639c
-
SHA512
ae18b15514dab9df11cc5721b3eb6aee975acaf8400e000d6858b69a820e1738d0fec981e41ffd2ebc6c603e76305e35c620808154010d66d06046f6b0d7e6f5
-
SSDEEP
393216:HZptqx8eq8QNCae3yO9yrtXCe3YZiyf3MXJPYr+Atm89OfVJv2xjKo3cj:HBqxRlRCCyrtXCigZUX2aam8EfVJux+b
Score8/10-
Checks if the Android device is rooted.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-