General
-
Target
698a11b427f9559a09df6f9cc646c929_JaffaCakes118
-
Size
1.8MB
-
Sample
240523-dl53wabh33
-
MD5
698a11b427f9559a09df6f9cc646c929
-
SHA1
57755b5d1e5e8dae58f7f465f82c0c4364040786
-
SHA256
31fe15d410ab571960a9fa11aa94af261b5f8a7c76b5a5b9516cf10ee9c7919c
-
SHA512
01bbe4cd6673ce3f3f18c73223aff631063a1cd73d189ec377a32d5def2a08998972b306ce2ba8ead2985eb9c44edc5ad3d17bde9b1be27f4f3d8af592bd91e8
-
SSDEEP
24576:iveoDlmdNt9ZuxY3R8zJiyaparH6gdiGVuQEllMV9MzxtpZLrfmkaRpKU:iveoDlmdPu2CYyaparLPVN+m0bNeLpKU
Static task
static1
Behavioral task
behavioral1
Sample
698a11b427f9559a09df6f9cc646c929_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
698a11b427f9559a09df6f9cc646c929_JaffaCakes118
-
Size
1.8MB
-
MD5
698a11b427f9559a09df6f9cc646c929
-
SHA1
57755b5d1e5e8dae58f7f465f82c0c4364040786
-
SHA256
31fe15d410ab571960a9fa11aa94af261b5f8a7c76b5a5b9516cf10ee9c7919c
-
SHA512
01bbe4cd6673ce3f3f18c73223aff631063a1cd73d189ec377a32d5def2a08998972b306ce2ba8ead2985eb9c44edc5ad3d17bde9b1be27f4f3d8af592bd91e8
-
SSDEEP
24576:iveoDlmdNt9ZuxY3R8zJiyaparH6gdiGVuQEllMV9MzxtpZLrfmkaRpKU:iveoDlmdPu2CYyaparLPVN+m0bNeLpKU
Score8/10-
Checks if the Android device is rooted.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-