General
-
Target
6d355a92901dae141d943709dda7815f_JaffaCakes118
-
Size
16.4MB
-
Sample
240524-d4nljsbe95
-
MD5
6d355a92901dae141d943709dda7815f
-
SHA1
b986484452f2ed9b9a4a0b65ca3836cde41f6815
-
SHA256
3d9759e53421687b7252353c3b21bf04c0b9bc88fe312d4268c857f70a1c4040
-
SHA512
f80cbdceaf5c808ff540b5636e8a8406c9797313c7fd7dccd3bab53a2cb04815bdca9a213ba75e8ae1c970562f9e8825e74c31bfc30f69674f7aab4cfd2158ef
-
SSDEEP
393216:Ihcm9qtrnqtHmBVO5CSoXL+TSKBpHwiO/T+WImI6i:IKftwmjkClaWaWImI3
Static task
static1
Behavioral task
behavioral1
Sample
6d355a92901dae141d943709dda7815f_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
6d355a92901dae141d943709dda7815f_JaffaCakes118
-
Size
16.4MB
-
MD5
6d355a92901dae141d943709dda7815f
-
SHA1
b986484452f2ed9b9a4a0b65ca3836cde41f6815
-
SHA256
3d9759e53421687b7252353c3b21bf04c0b9bc88fe312d4268c857f70a1c4040
-
SHA512
f80cbdceaf5c808ff540b5636e8a8406c9797313c7fd7dccd3bab53a2cb04815bdca9a213ba75e8ae1c970562f9e8825e74c31bfc30f69674f7aab4cfd2158ef
-
SSDEEP
393216:Ihcm9qtrnqtHmBVO5CSoXL+TSKBpHwiO/T+WImI6i:IKftwmjkClaWaWImI3
Score8/10-
Checks if the Android device is rooted.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-