General
-
Target
6a45c5ed1aad37ca45b47dfea646550d_JaffaCakes118
-
Size
10.0MB
-
Sample
240523-jv5rcsab8z
-
MD5
6a45c5ed1aad37ca45b47dfea646550d
-
SHA1
8a4ba55faddfc1b017da4af98490a0348957d3df
-
SHA256
9dc48fa9f7d85d9c5d8bb7b443f1c13c5f9ee115229ac2199d73998659d239ae
-
SHA512
8833b531613f52c4f4e2c9e082d400e6206dd938b2c44d30555477464aa4942a1fad3e2a9929ca84c343b2c1eb7ba9e28210942617a2df9a267bf7fca664251d
-
SSDEEP
196608:l11fHT2tTsQScwzCKrhPbbWbvXYIsY3LwuISn/SlAh1IqRXwSD0pL+YjeaUz:71fojwuK1PAs2zn6lS1ZRASgkWpU
Static task
static1
Behavioral task
behavioral1
Sample
6a45c5ed1aad37ca45b47dfea646550d_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
6a45c5ed1aad37ca45b47dfea646550d_JaffaCakes118
-
Size
10.0MB
-
MD5
6a45c5ed1aad37ca45b47dfea646550d
-
SHA1
8a4ba55faddfc1b017da4af98490a0348957d3df
-
SHA256
9dc48fa9f7d85d9c5d8bb7b443f1c13c5f9ee115229ac2199d73998659d239ae
-
SHA512
8833b531613f52c4f4e2c9e082d400e6206dd938b2c44d30555477464aa4942a1fad3e2a9929ca84c343b2c1eb7ba9e28210942617a2df9a267bf7fca664251d
-
SSDEEP
196608:l11fHT2tTsQScwzCKrhPbbWbvXYIsY3LwuISn/SlAh1IqRXwSD0pL+YjeaUz:71fojwuK1PAs2zn6lS1ZRASgkWpU
Score8/10-
Checks if the Android device is rooted.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-