General
-
Target
66c297922e1a5179b99bf81b1bd9d492_JaffaCakes118
-
Size
28.6MB
-
Sample
240522-k7fhnsae2s
-
MD5
66c297922e1a5179b99bf81b1bd9d492
-
SHA1
651d39d9e12b009dbdc000889325c979d0c4b9e7
-
SHA256
c3b38aa9cfa03ca08c7a094e6d59686b57da674437536ab2ae05e7322792f374
-
SHA512
7cbd3fb1df12e72f237997b5e339c5e01d1264cce5ae3b5a6984c2c9c43e3f249e12fb5f176495ab82e9348d13b1e8994d23ad0ea6a0fbf2475cfe3a60c07e46
-
SSDEEP
786432:cerK5FNwrhcZIMu28D6q4AQfWPFWrG0/zVu4erRFIFx:7rKwl/Mu28D61AQfWArG0/zzx
Static task
static1
Behavioral task
behavioral1
Sample
66c297922e1a5179b99bf81b1bd9d492_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
66c297922e1a5179b99bf81b1bd9d492_JaffaCakes118
-
Size
28.6MB
-
MD5
66c297922e1a5179b99bf81b1bd9d492
-
SHA1
651d39d9e12b009dbdc000889325c979d0c4b9e7
-
SHA256
c3b38aa9cfa03ca08c7a094e6d59686b57da674437536ab2ae05e7322792f374
-
SHA512
7cbd3fb1df12e72f237997b5e339c5e01d1264cce5ae3b5a6984c2c9c43e3f249e12fb5f176495ab82e9348d13b1e8994d23ad0ea6a0fbf2475cfe3a60c07e46
-
SSDEEP
786432:cerK5FNwrhcZIMu28D6q4AQfWPFWrG0/zVu4erRFIFx:7rKwl/Mu28D61AQfWArG0/zzx
Score8/10-
Checks if the Android device is rooted.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Reads information about phone network operator.
-