General
-
Target
69e0d9ef3b269831ac7cf2370ee17497_JaffaCakes118
-
Size
11.6MB
-
Sample
240523-f41xzsfb5y
-
MD5
69e0d9ef3b269831ac7cf2370ee17497
-
SHA1
ca6a6a592d41e635c7ef098942601048f8e27a2d
-
SHA256
1411e31852dbe7bd2dafec671048e2f81c342f7201245a27ad7f12875eac82cd
-
SHA512
94ae61e24e461aafd77a37700af0e2695af108f306ffb28af65500197bc73f9ec366caa4313d2ee1d543c98c6afb6d369be55dd272a0ade6a97ce5fef7966aae
-
SSDEEP
196608:dDxogxNF6/5f4ylOPpumK+I6/8ii42Ph6i2fLF7dh+CXfsYYuJB4UK56:dlhNF66LEmE6/8H42ALFaCX0Juf4A
Static task
static1
Behavioral task
behavioral1
Sample
69e0d9ef3b269831ac7cf2370ee17497_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
69e0d9ef3b269831ac7cf2370ee17497_JaffaCakes118
-
Size
11.6MB
-
MD5
69e0d9ef3b269831ac7cf2370ee17497
-
SHA1
ca6a6a592d41e635c7ef098942601048f8e27a2d
-
SHA256
1411e31852dbe7bd2dafec671048e2f81c342f7201245a27ad7f12875eac82cd
-
SHA512
94ae61e24e461aafd77a37700af0e2695af108f306ffb28af65500197bc73f9ec366caa4313d2ee1d543c98c6afb6d369be55dd272a0ade6a97ce5fef7966aae
-
SSDEEP
196608:dDxogxNF6/5f4ylOPpumK+I6/8ii42Ph6i2fLF7dh+CXfsYYuJB4UK56:dlhNF66LEmE6/8H42ALFaCX0Juf4A
Score8/10-
Checks if the Android device is rooted.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-