General
-
Target
6774ee4f7a0e305f07f65b193ccdd09f_JaffaCakes118
-
Size
23.0MB
-
Sample
240522-qznrzade2z
-
MD5
6774ee4f7a0e305f07f65b193ccdd09f
-
SHA1
015242b55a92a7d39160304fcbbd9d6eb8a85081
-
SHA256
1f7793b5e5ba8c85a261b44ea3fb2cd94814fc22bb766cbfe7116f1636611342
-
SHA512
549f04520cc8149f9b8a79a76565eab8d7c839f08561cba375ed7502c4e67220ca5943dd062b2543da7c35058fc5c62373cc81eeef615241c474ecc70ca5556c
-
SSDEEP
393216:qPL2BRW7gqsqD9vEx2Yl7+33RmSgevWvhRt5Kn0qHVb8sZquBrt4+K1Ic58AtR3w:JrWUks4l33RmvgWvvKrVb8sqQJ81l58B
Static task
static1
Behavioral task
behavioral1
Sample
6774ee4f7a0e305f07f65b193ccdd09f_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
6774ee4f7a0e305f07f65b193ccdd09f_JaffaCakes118
-
Size
23.0MB
-
MD5
6774ee4f7a0e305f07f65b193ccdd09f
-
SHA1
015242b55a92a7d39160304fcbbd9d6eb8a85081
-
SHA256
1f7793b5e5ba8c85a261b44ea3fb2cd94814fc22bb766cbfe7116f1636611342
-
SHA512
549f04520cc8149f9b8a79a76565eab8d7c839f08561cba375ed7502c4e67220ca5943dd062b2543da7c35058fc5c62373cc81eeef615241c474ecc70ca5556c
-
SSDEEP
393216:qPL2BRW7gqsqD9vEx2Yl7+33RmSgevWvhRt5Kn0qHVb8sZquBrt4+K1Ic58AtR3w:JrWUks4l33RmvgWvvKrVb8sqQJ81l58B
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries information about the current nearby Wi-Fi networks
Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-