General
-
Target
676d2afcc96e0c7576d36e71dd850aa9_JaffaCakes118
-
Size
5.9MB
-
Sample
240522-qsqmzsdb92
-
MD5
676d2afcc96e0c7576d36e71dd850aa9
-
SHA1
59bf286bfa92bfb028f6a5705cbed9eda558bcc2
-
SHA256
ec195c6b415ce535c92a704b47dbc0a26ed7a6bf6bc7980edbc1573092dc74c1
-
SHA512
302a5f28c71b69948421ab89617c6fb0517cf67a227e4bb67823af272d876afa1b5472ac5a49c5a2d982f5add1ad3bfcf5b8bec685167d8bd1ba87957cc98f39
-
SSDEEP
98304:xMP5sNM0K8kJcdN4n4CCA4WOjw66L6eWwFVMp2ugyZsPBcyzmglhiC8g:uPcMPBu3xA4fjw66ZlFaIf2Fglhf9
Static task
static1
Behavioral task
behavioral1
Sample
676d2afcc96e0c7576d36e71dd850aa9_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
676d2afcc96e0c7576d36e71dd850aa9_JaffaCakes118.apk
Resource
android-x64-arm64-20240514-en
Malware Config
Targets
-
-
Target
676d2afcc96e0c7576d36e71dd850aa9_JaffaCakes118
-
Size
5.9MB
-
MD5
676d2afcc96e0c7576d36e71dd850aa9
-
SHA1
59bf286bfa92bfb028f6a5705cbed9eda558bcc2
-
SHA256
ec195c6b415ce535c92a704b47dbc0a26ed7a6bf6bc7980edbc1573092dc74c1
-
SHA512
302a5f28c71b69948421ab89617c6fb0517cf67a227e4bb67823af272d876afa1b5472ac5a49c5a2d982f5add1ad3bfcf5b8bec685167d8bd1ba87957cc98f39
-
SSDEEP
98304:xMP5sNM0K8kJcdN4n4CCA4WOjw66L6eWwFVMp2ugyZsPBcyzmglhiC8g:uPcMPBu3xA4fjw66ZlFaIf2Fglhf9
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-