General
-
Target
692cff3b40928e45c654ac9675abf3f7_JaffaCakes118
-
Size
24.5MB
-
Sample
240523-a1qpysfa8y
-
MD5
692cff3b40928e45c654ac9675abf3f7
-
SHA1
cddd223a2740ff3a23a94c4c058c88853b7d4c58
-
SHA256
6d0ce6305e977d28ba4e7bac35de605151a8c22968b71150459bae70ecbd58c9
-
SHA512
cd4c6324fbc362e3553e13138ecd045c28b9068defad47b46392c05d3ed7fba4440fed1100128f9a720093e68ad866859fa3de56a472e4dbc43b36f81f5e5f15
-
SSDEEP
393216:zSYKBXFNW4CX11z3fyh9z9LJfivE7aakUVfflX40SonP:OPRmbl1zqbz9ZqE2XSoCP
Behavioral task
behavioral1
Sample
692cff3b40928e45c654ac9675abf3f7_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
692cff3b40928e45c654ac9675abf3f7_JaffaCakes118
-
Size
24.5MB
-
MD5
692cff3b40928e45c654ac9675abf3f7
-
SHA1
cddd223a2740ff3a23a94c4c058c88853b7d4c58
-
SHA256
6d0ce6305e977d28ba4e7bac35de605151a8c22968b71150459bae70ecbd58c9
-
SHA512
cd4c6324fbc362e3553e13138ecd045c28b9068defad47b46392c05d3ed7fba4440fed1100128f9a720093e68ad866859fa3de56a472e4dbc43b36f81f5e5f15
-
SSDEEP
393216:zSYKBXFNW4CX11z3fyh9z9LJfivE7aakUVfflX40SonP:OPRmbl1zqbz9ZqE2XSoCP
Score8/10-
Checks if the Android device is rooted.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Checks the presence of a debugger
-