General
-
Target
6d83017e1b195aee1ca4221f2fcbad33_JaffaCakes118
-
Size
14.5MB
-
Sample
240524-gh3p5aff5x
-
MD5
6d83017e1b195aee1ca4221f2fcbad33
-
SHA1
8abb6f5de6455bcec18e53ca3c4b71295a0f6dd6
-
SHA256
c0d13c0ee35c4fccbd3fe27fb1b6d6a0510f5ad4a5c51adde6f5b6dba7c16ac7
-
SHA512
d86c0bc4acedf5799c8e1a4a04fd2ff8270bff4e57171ce6698acbb8e79315facc4c2a0ae000b756952d5cd0a2a3aa0ffdf3ad3dbe156fa0b4e63ddbf3932e45
-
SSDEEP
393216:OLNfiCZrezB25r6ykGl3FzysWyqVCvjX9TQlmep7jpOabwgbJ:OBiorco5r6ykG3RhGCvjNTS75fJ
Static task
static1
Behavioral task
behavioral1
Sample
6d83017e1b195aee1ca4221f2fcbad33_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
6d83017e1b195aee1ca4221f2fcbad33_JaffaCakes118
-
Size
14.5MB
-
MD5
6d83017e1b195aee1ca4221f2fcbad33
-
SHA1
8abb6f5de6455bcec18e53ca3c4b71295a0f6dd6
-
SHA256
c0d13c0ee35c4fccbd3fe27fb1b6d6a0510f5ad4a5c51adde6f5b6dba7c16ac7
-
SHA512
d86c0bc4acedf5799c8e1a4a04fd2ff8270bff4e57171ce6698acbb8e79315facc4c2a0ae000b756952d5cd0a2a3aa0ffdf3ad3dbe156fa0b4e63ddbf3932e45
-
SSDEEP
393216:OLNfiCZrezB25r6ykGl3FzysWyqVCvjX9TQlmep7jpOabwgbJ:OBiorco5r6ykG3RhGCvjNTS75fJ
Score8/10-
Checks if the Android device is rooted.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-