General
-
Target
6a2f17b95055ee30f06eb0309fa20a1e_JaffaCakes118
-
Size
15.5MB
-
Sample
240523-h8ml9shd7z
-
MD5
6a2f17b95055ee30f06eb0309fa20a1e
-
SHA1
fefac3e4a69f77bdf2b8a5f2723812fdb334362c
-
SHA256
582566776ce64bc513bf692f65116dfe3b89395c7d14e0f47e8eb524dbcb4cdd
-
SHA512
01ce851762e45977b7301c53147b1bb6f4fe3c2ea9356c62bd825c1fb9c7d60d9d67c47510c487482de7dbbffb2ff9795d3c210e65d2b0bf69068415b81512bb
-
SSDEEP
393216:+uM1OFl/ZlEIhB0PbZzbwcZGI7NnS4CZv2+1:+uMML/ZllhB0xbBvOec
Static task
static1
Behavioral task
behavioral1
Sample
6a2f17b95055ee30f06eb0309fa20a1e_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
6a2f17b95055ee30f06eb0309fa20a1e_JaffaCakes118
-
Size
15.5MB
-
MD5
6a2f17b95055ee30f06eb0309fa20a1e
-
SHA1
fefac3e4a69f77bdf2b8a5f2723812fdb334362c
-
SHA256
582566776ce64bc513bf692f65116dfe3b89395c7d14e0f47e8eb524dbcb4cdd
-
SHA512
01ce851762e45977b7301c53147b1bb6f4fe3c2ea9356c62bd825c1fb9c7d60d9d67c47510c487482de7dbbffb2ff9795d3c210e65d2b0bf69068415b81512bb
-
SSDEEP
393216:+uM1OFl/ZlEIhB0PbZzbwcZGI7NnS4CZv2+1:+uMML/ZllhB0xbBvOec
Score8/10-
Checks if the Android device is rooted.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-