General
-
Target
66ee31fd22538c4e9bc33b7a868a5cd9_JaffaCakes118
-
Size
30.6MB
-
Sample
240522-mdmq1abg5s
-
MD5
66ee31fd22538c4e9bc33b7a868a5cd9
-
SHA1
1f65b3c9d595f5aba22bb9b567c26db7d6c52c74
-
SHA256
d57083cbc78348f1d77f1b2cc33ffee7fad318bb2147deb8198ee1b235ba4d02
-
SHA512
28dccc077fce1bce6cf7e8bb54e85828021cc630098b6df2c1d7248400031aaa5467289e57dcc9dc9c99d499cb87a6bb291658c2706d2e09f2d3f3072013ba3d
-
SSDEEP
786432:FWsoZd9jYwiPdUNweA0mKZYhF2g71ntUMv/0j9BsqulLf7:FWs28rGNpn6hjtz0j9BEv
Static task
static1
Behavioral task
behavioral1
Sample
66ee31fd22538c4e9bc33b7a868a5cd9_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
66ee31fd22538c4e9bc33b7a868a5cd9_JaffaCakes118
-
Size
30.6MB
-
MD5
66ee31fd22538c4e9bc33b7a868a5cd9
-
SHA1
1f65b3c9d595f5aba22bb9b567c26db7d6c52c74
-
SHA256
d57083cbc78348f1d77f1b2cc33ffee7fad318bb2147deb8198ee1b235ba4d02
-
SHA512
28dccc077fce1bce6cf7e8bb54e85828021cc630098b6df2c1d7248400031aaa5467289e57dcc9dc9c99d499cb87a6bb291658c2706d2e09f2d3f3072013ba3d
-
SSDEEP
786432:FWsoZd9jYwiPdUNweA0mKZYhF2g71ntUMv/0j9BsqulLf7:FWs28rGNpn6hjtz0j9BEv
Score8/10-
Checks if the Android device is rooted.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Checks the presence of a debugger
-