General
-
Target
6918e88e806ca1f2348d2bf4c53f5de5_JaffaCakes118
-
Size
15.4MB
-
Sample
240523-af3tsaed54
-
MD5
6918e88e806ca1f2348d2bf4c53f5de5
-
SHA1
575709567f9f71f15e9a1a17decd199ef32a80ea
-
SHA256
5ee2767c20786516cf30caee9afa3b05d13934a803920f8d3683f2e198d5b213
-
SHA512
9f467d33cfbda9d0167fe89e296bf6b6927f7f471bff98ef0ab00e98cd5c7a47021109e5f88e71adb2d23d374bf39fbda740fd8a5611bffb0d45a0a6a74604f3
-
SSDEEP
393216:ApqaT+GPLPzyhEyBrLsaw9zHkUrjAdRcEAUzB:qqaKkrUrcRw/hrd
Static task
static1
Behavioral task
behavioral1
Sample
6918e88e806ca1f2348d2bf4c53f5de5_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
6918e88e806ca1f2348d2bf4c53f5de5_JaffaCakes118
-
Size
15.4MB
-
MD5
6918e88e806ca1f2348d2bf4c53f5de5
-
SHA1
575709567f9f71f15e9a1a17decd199ef32a80ea
-
SHA256
5ee2767c20786516cf30caee9afa3b05d13934a803920f8d3683f2e198d5b213
-
SHA512
9f467d33cfbda9d0167fe89e296bf6b6927f7f471bff98ef0ab00e98cd5c7a47021109e5f88e71adb2d23d374bf39fbda740fd8a5611bffb0d45a0a6a74604f3
-
SSDEEP
393216:ApqaT+GPLPzyhEyBrLsaw9zHkUrjAdRcEAUzB:qqaKkrUrcRw/hrd
Score8/10-
Checks if the Android device is rooted.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-