General
-
Target
696a368b5ca0ddc208b9f3d30e96906e_JaffaCakes118
-
Size
5.5MB
-
Sample
240523-cpn34aad48
-
MD5
696a368b5ca0ddc208b9f3d30e96906e
-
SHA1
974fcc289ad01bc4e9f5d27145f014c8f611842a
-
SHA256
542eb5c022be49026f95135e4bbad3eb8a14ec5ca56b0d9e29f49c74a6257441
-
SHA512
a925a9b7f1e6637b1dd83d4a198ba945e2f297f70a7902480cda57db1d1a7292fa598dec9f29acd802bbd0654b1f35aef87c835ec261365540a6b90f6cd507a9
-
SSDEEP
98304:qRPnsQaf9SU/N8m4euy6sMhUaUyrymUvDK/q2CE37IbN+7:SEQ49x/6m4XV5hOgym6DK/ql3O
Static task
static1
Behavioral task
behavioral1
Sample
696a368b5ca0ddc208b9f3d30e96906e_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
696a368b5ca0ddc208b9f3d30e96906e_JaffaCakes118
-
Size
5.5MB
-
MD5
696a368b5ca0ddc208b9f3d30e96906e
-
SHA1
974fcc289ad01bc4e9f5d27145f014c8f611842a
-
SHA256
542eb5c022be49026f95135e4bbad3eb8a14ec5ca56b0d9e29f49c74a6257441
-
SHA512
a925a9b7f1e6637b1dd83d4a198ba945e2f297f70a7902480cda57db1d1a7292fa598dec9f29acd802bbd0654b1f35aef87c835ec261365540a6b90f6cd507a9
-
SSDEEP
98304:qRPnsQaf9SU/N8m4euy6sMhUaUyrymUvDK/q2CE37IbN+7:SEQ49x/6m4XV5hOgym6DK/ql3O
Score8/10-
Checks if the Android device is rooted.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-