General
-
Target
71f1c810374d3204c48b1921ccdbf637_JaffaCakes118
-
Size
25.1MB
-
Sample
240525-pl27rsah3t
-
MD5
71f1c810374d3204c48b1921ccdbf637
-
SHA1
5f83afaaac1b872399f136e3b67d662a08ca3a59
-
SHA256
124074e575560365a93cbef654360a960c72f9a6396084176f2873dabfd90456
-
SHA512
deda204cab1f5c051009e9ac048080b1e463b98852ada531701374bfacef8250f2a8d7c49bb284a9298d01d1cb3dd97d0d387c81643d09d784e8982d26b51b7f
-
SSDEEP
786432:YbP6wMnjFE1pDxZnvA4ZMRj6edH7H6Ybz4LPfXCWCEJBFkZDX++WrRlyYOVBaXL:YbP6wM6kfILFkglMa7
Static task
static1
Behavioral task
behavioral1
Sample
71f1c810374d3204c48b1921ccdbf637_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
71f1c810374d3204c48b1921ccdbf637_JaffaCakes118
-
Size
25.1MB
-
MD5
71f1c810374d3204c48b1921ccdbf637
-
SHA1
5f83afaaac1b872399f136e3b67d662a08ca3a59
-
SHA256
124074e575560365a93cbef654360a960c72f9a6396084176f2873dabfd90456
-
SHA512
deda204cab1f5c051009e9ac048080b1e463b98852ada531701374bfacef8250f2a8d7c49bb284a9298d01d1cb3dd97d0d387c81643d09d784e8982d26b51b7f
-
SSDEEP
786432:YbP6wMnjFE1pDxZnvA4ZMRj6edH7H6Ybz4LPfXCWCEJBFkZDX++WrRlyYOVBaXL:YbP6wM6kfILFkglMa7
Score7/10-
Checks Android system properties for emulator presence.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-