General
-
Target
90eda8fab157875cddf3cef3fc760a4d_JaffaCakes118
-
Size
17.3MB
-
Sample
240603-h4fm6aha38
-
MD5
90eda8fab157875cddf3cef3fc760a4d
-
SHA1
1ca6adfdf2e4d078ba195860bf797878f6f5ab27
-
SHA256
4e3c10e59b61650ce428aab76c7e1439de073e8b11700ba6088e9ccc7ce6e205
-
SHA512
da7d50835325ed9bb642f9e15f07c57053fb38556f721ab12e8742263509c98c15a8c4582230c8ed04d056bbc6cdc2fa571688df0fbe5a0b8a6615de139ff7d1
-
SSDEEP
393216:7vfP8Gxx2UmTrL6cb8l6fPLP0SIsSCQa0FkflCcqlVmRl9t:LRxtuA8PLP09sSltOfJq3S9t
Static task
static1
Behavioral task
behavioral1
Sample
90eda8fab157875cddf3cef3fc760a4d_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
90eda8fab157875cddf3cef3fc760a4d_JaffaCakes118
-
Size
17.3MB
-
MD5
90eda8fab157875cddf3cef3fc760a4d
-
SHA1
1ca6adfdf2e4d078ba195860bf797878f6f5ab27
-
SHA256
4e3c10e59b61650ce428aab76c7e1439de073e8b11700ba6088e9ccc7ce6e205
-
SHA512
da7d50835325ed9bb642f9e15f07c57053fb38556f721ab12e8742263509c98c15a8c4582230c8ed04d056bbc6cdc2fa571688df0fbe5a0b8a6615de139ff7d1
-
SSDEEP
393216:7vfP8Gxx2UmTrL6cb8l6fPLP0SIsSCQa0FkflCcqlVmRl9t:LRxtuA8PLP09sSltOfJq3S9t
Score8/10-
Checks if the Android device is rooted.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-