General
-
Target
66d4f58fc8a6436c385a9f36869e67c5_JaffaCakes118
-
Size
8.8MB
-
Sample
240522-lp49raah58
-
MD5
66d4f58fc8a6436c385a9f36869e67c5
-
SHA1
2f11a711643a3962b6e129486ed915e3658d26f0
-
SHA256
afef73f159e1c892bf1e5cbeaa4d3fc7f50c2f9acb787f2172feae0ee2ff2172
-
SHA512
085522b8516baa00fe05173777f69093affacc2fa728a25f5951ee9bb1cf1dd8a2e01f421aac0fe81fd74a077681d45868ad509c9e7467d116f4a05dd422f401
-
SSDEEP
196608:RutIy9+84h/Vj6odYbGSkYrktdaudMxwaRli1bKPi655/p+Gbpi:+J9t4h/Vj6HkYAt0udraRh17Uh
Static task
static1
Behavioral task
behavioral1
Sample
66d4f58fc8a6436c385a9f36869e67c5_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
66d4f58fc8a6436c385a9f36869e67c5_JaffaCakes118
-
Size
8.8MB
-
MD5
66d4f58fc8a6436c385a9f36869e67c5
-
SHA1
2f11a711643a3962b6e129486ed915e3658d26f0
-
SHA256
afef73f159e1c892bf1e5cbeaa4d3fc7f50c2f9acb787f2172feae0ee2ff2172
-
SHA512
085522b8516baa00fe05173777f69093affacc2fa728a25f5951ee9bb1cf1dd8a2e01f421aac0fe81fd74a077681d45868ad509c9e7467d116f4a05dd422f401
-
SSDEEP
196608:RutIy9+84h/Vj6odYbGSkYrktdaudMxwaRli1bKPi655/p+Gbpi:+J9t4h/Vj6HkYAt0udraRh17Uh
Score8/10-
Checks if the Android device is rooted.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-