General
-
Target
679fbc2f64b3ca5374307e3bf343ed2a_JaffaCakes118
-
Size
5.2MB
-
Sample
240522-r5jwmseg89
-
MD5
679fbc2f64b3ca5374307e3bf343ed2a
-
SHA1
9d3209a7313019c2b82300bb9e144d2f9b094d71
-
SHA256
b40420a5af7cfe8ba0e5c91fecb404707ce342f6a0362eee441fa734413aa0c4
-
SHA512
1b2c5c4a87a12d6c17db0b1aa034d35b16f7f23fb072681390379860a7a3ffa79023ea6695e4ae86fd0defc9be07b6b77871a5e690744f96fc5690f7d04e9ea3
-
SSDEEP
98304:a3PndjirR4ebFpb9Us0JKUuIk9aSBBPXcajpyi7lvgGcfgL2AP4TIwDUk:a3PUtxeJbUtcaljlvv12APoIwh
Static task
static1
Behavioral task
behavioral1
Sample
679fbc2f64b3ca5374307e3bf343ed2a_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
679fbc2f64b3ca5374307e3bf343ed2a_JaffaCakes118.apk
Resource
android-x64-20240514-en
Malware Config
Targets
-
-
Target
679fbc2f64b3ca5374307e3bf343ed2a_JaffaCakes118
-
Size
5.2MB
-
MD5
679fbc2f64b3ca5374307e3bf343ed2a
-
SHA1
9d3209a7313019c2b82300bb9e144d2f9b094d71
-
SHA256
b40420a5af7cfe8ba0e5c91fecb404707ce342f6a0362eee441fa734413aa0c4
-
SHA512
1b2c5c4a87a12d6c17db0b1aa034d35b16f7f23fb072681390379860a7a3ffa79023ea6695e4ae86fd0defc9be07b6b77871a5e690744f96fc5690f7d04e9ea3
-
SSDEEP
98304:a3PndjirR4ebFpb9Us0JKUuIk9aSBBPXcajpyi7lvgGcfgL2AP4TIwDUk:a3PUtxeJbUtcaljlvv12APoIwh
Score8/10-
Checks if the Android device is rooted.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Checks the presence of a debugger
-