General
-
Target
67225313708756133d030a45a6ce5a4b_JaffaCakes118
-
Size
14.9MB
-
Sample
240522-nsrtyadb53
-
MD5
67225313708756133d030a45a6ce5a4b
-
SHA1
a324c1570b5652cea1f3e53d64ef4ecc01ef3283
-
SHA256
775995e112962693df17c7a9f9ce440fcea9f7e8b811c31fc61fd7f0ab06897e
-
SHA512
6cce7be96a4f971980742d84c577c217332f894f463afd606eb14b859c204539f995dc670d552df43a743162e49a7734057bbe4560bb1f765cab47623978e0ec
-
SSDEEP
196608:GxJBbqX1IuSYvwh7jJwyjnMmPtoAjZdAN/Owsmcpx7pU82UIQ0GkclRYJA4/5+s6:5Pz6iyjnrFoAjjAGFjU82UIdGwJHW3GW
Static task
static1
Behavioral task
behavioral1
Sample
67225313708756133d030a45a6ce5a4b_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
67225313708756133d030a45a6ce5a4b_JaffaCakes118
-
Size
14.9MB
-
MD5
67225313708756133d030a45a6ce5a4b
-
SHA1
a324c1570b5652cea1f3e53d64ef4ecc01ef3283
-
SHA256
775995e112962693df17c7a9f9ce440fcea9f7e8b811c31fc61fd7f0ab06897e
-
SHA512
6cce7be96a4f971980742d84c577c217332f894f463afd606eb14b859c204539f995dc670d552df43a743162e49a7734057bbe4560bb1f765cab47623978e0ec
-
SSDEEP
196608:GxJBbqX1IuSYvwh7jJwyjnMmPtoAjZdAN/Owsmcpx7pU82UIQ0GkclRYJA4/5+s6:5Pz6iyjnrFoAjjAGFjU82UIdGwJHW3GW
Score8/10-
Checks if the Android device is rooted.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-