General
-
Target
66f3d2c50d20ec1fceaef6efcfc93eda_JaffaCakes118
-
Size
30.9MB
-
Sample
240522-mjmyysbh48
-
MD5
66f3d2c50d20ec1fceaef6efcfc93eda
-
SHA1
0e6fca934f329cf7531e72de91fa50f83a777326
-
SHA256
8268a7e3ca738deb9341d7dd3beba940c95af5223b10e732f1ef8a6184aa690c
-
SHA512
1f81e1807a4151de714156f0fbc40b45e483985b65b6fd4440a41b73bf123198850db4472694a2fd17f675f1fc41ce2d53c81b70d455777f35e32b7eca7ab25d
-
SSDEEP
786432:foTcVC1QQhRdwlSbr6oLgGhzMNbM6wCzMNbn9P5TJSjpSuF+y:rOdhLwlSbr57h+aC+F5TcQNy
Static task
static1
Behavioral task
behavioral1
Sample
66f3d2c50d20ec1fceaef6efcfc93eda_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
66f3d2c50d20ec1fceaef6efcfc93eda_JaffaCakes118
-
Size
30.9MB
-
MD5
66f3d2c50d20ec1fceaef6efcfc93eda
-
SHA1
0e6fca934f329cf7531e72de91fa50f83a777326
-
SHA256
8268a7e3ca738deb9341d7dd3beba940c95af5223b10e732f1ef8a6184aa690c
-
SHA512
1f81e1807a4151de714156f0fbc40b45e483985b65b6fd4440a41b73bf123198850db4472694a2fd17f675f1fc41ce2d53c81b70d455777f35e32b7eca7ab25d
-
SSDEEP
786432:foTcVC1QQhRdwlSbr6oLgGhzMNbM6wCzMNbn9P5TJSjpSuF+y:rOdhLwlSbr57h+aC+F5TcQNy
Score8/10-
Checks if the Android device is rooted.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-