General
-
Target
69ba1f1ade25eda9fc2e41a5f1464dad_JaffaCakes118
-
Size
9.9MB
-
Sample
240523-e4x1nadg9s
-
MD5
69ba1f1ade25eda9fc2e41a5f1464dad
-
SHA1
1efe4ad44c6f78f11229cd8f162b65d156ccd36e
-
SHA256
8d55bee23ad78905663a25e01d958cd9726148bee92a2162fda54c628068b6a7
-
SHA512
405e09b30ce9ce3175379885b4809b6891b5f1574e73bbb12b9cd28863c67739d4e2c7970680af2f033baf5816298680507a765d6516d4e40897bbaa06aebeff
-
SSDEEP
196608:y/HIApKG18qHqDMyzgjA2/7dLckj1tokSnVN9eB+8i2ARdNdvbH5nj0FkCQt:cJp1GU/7dVj1WkSV7G+l2AR1vbH5nj0g
Static task
static1
Behavioral task
behavioral1
Sample
69ba1f1ade25eda9fc2e41a5f1464dad_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
69ba1f1ade25eda9fc2e41a5f1464dad_JaffaCakes118
-
Size
9.9MB
-
MD5
69ba1f1ade25eda9fc2e41a5f1464dad
-
SHA1
1efe4ad44c6f78f11229cd8f162b65d156ccd36e
-
SHA256
8d55bee23ad78905663a25e01d958cd9726148bee92a2162fda54c628068b6a7
-
SHA512
405e09b30ce9ce3175379885b4809b6891b5f1574e73bbb12b9cd28863c67739d4e2c7970680af2f033baf5816298680507a765d6516d4e40897bbaa06aebeff
-
SSDEEP
196608:y/HIApKG18qHqDMyzgjA2/7dLckj1tokSnVN9eB+8i2ARdNdvbH5nj0FkCQt:cJp1GU/7dVj1WkSV7G+l2AR1vbH5nj0g
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Reads information about phone network operator.
-