General
-
Target
8fa3e89c15ae81faa3e45b9a07069277_JaffaCakes118
-
Size
23.6MB
-
Sample
240602-2bmqjsac57
-
MD5
8fa3e89c15ae81faa3e45b9a07069277
-
SHA1
28e3006cbed073982d7e46ffebab4dc98ce37a92
-
SHA256
2c750708e7d566ffd5a141e0b0126b710e74598d749e38a28445ee8f79b4d77f
-
SHA512
f0f8070de894bc648098c30f5424d03292360c4b7f2a5093a3773c87e28209face6ca9de6643407fa8eedf797d17b201ffb389456446d6e4a6bf204d9b2ed2bd
-
SSDEEP
393216:NKdZILN5fnXkpy0V9C/+YneLlRDMO/UfVTW9xYpnUzhJfAmc68:N97n0py0Ld/UdTWbcehK68
Static task
static1
Behavioral task
behavioral1
Sample
8fa3e89c15ae81faa3e45b9a07069277_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
8fa3e89c15ae81faa3e45b9a07069277_JaffaCakes118
-
Size
23.6MB
-
MD5
8fa3e89c15ae81faa3e45b9a07069277
-
SHA1
28e3006cbed073982d7e46ffebab4dc98ce37a92
-
SHA256
2c750708e7d566ffd5a141e0b0126b710e74598d749e38a28445ee8f79b4d77f
-
SHA512
f0f8070de894bc648098c30f5424d03292360c4b7f2a5093a3773c87e28209face6ca9de6643407fa8eedf797d17b201ffb389456446d6e4a6bf204d9b2ed2bd
-
SSDEEP
393216:NKdZILN5fnXkpy0V9C/+YneLlRDMO/UfVTW9xYpnUzhJfAmc68:N97n0py0Ld/UdTWbcehK68
Score8/10-
Checks if the Android device is rooted.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-