General
-
Target
6a3e5995b9b464e854df7eb339a7fb52_JaffaCakes118
-
Size
15.4MB
-
Sample
240523-jnrk6ahh39
-
MD5
6a3e5995b9b464e854df7eb339a7fb52
-
SHA1
fd94015a3c442dd615bc8bc9581691e38f4330d5
-
SHA256
9a626ba5e94c88da4e83cbc4266c1ebc0b3000bb427eb9383d91ccfc95be8d64
-
SHA512
b157c418b6c840f55d1ade6e16e3ee0971c6fabebf1440369a44ae27440121d70ccf7ac87995752e7b80849c21ba85ecc9b14b058bb302edc54bddae746d4b3d
-
SSDEEP
393216:HZiNlDdGsNqRG3U3ujr2pW1BS+dIZmL3OzuDdp+mz71:klDdV2G3XHBS+SmLnDdp+81
Static task
static1
Behavioral task
behavioral1
Sample
6a3e5995b9b464e854df7eb339a7fb52_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
6a3e5995b9b464e854df7eb339a7fb52_JaffaCakes118
-
Size
15.4MB
-
MD5
6a3e5995b9b464e854df7eb339a7fb52
-
SHA1
fd94015a3c442dd615bc8bc9581691e38f4330d5
-
SHA256
9a626ba5e94c88da4e83cbc4266c1ebc0b3000bb427eb9383d91ccfc95be8d64
-
SHA512
b157c418b6c840f55d1ade6e16e3ee0971c6fabebf1440369a44ae27440121d70ccf7ac87995752e7b80849c21ba85ecc9b14b058bb302edc54bddae746d4b3d
-
SSDEEP
393216:HZiNlDdGsNqRG3U3ujr2pW1BS+dIZmL3OzuDdp+mz71:klDdV2G3XHBS+SmLnDdp+81
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries information about the current nearby Wi-Fi networks
Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-