General
-
Target
910b9bccc7e8a20e738b8ec139b3bb05_JaffaCakes118
-
Size
9.8MB
-
Sample
240603-jxvdeahh83
-
MD5
910b9bccc7e8a20e738b8ec139b3bb05
-
SHA1
8695d86c3cf698599b33bf9a825988cbb89f1f25
-
SHA256
a7749ac68f8ef308b5e771ea7c92e6973f9b65f0064d53b1a92a1223ae097000
-
SHA512
11d31431846edf9ec1187b3ff17fecfc789e1d4465074522f739bdd09c63f6e94c8e6197eadeff11f070f96cc843d53b3150fa25e54c6918cd7fed8dcee42df9
-
SSDEEP
196608:0WcV7gPcUELqkpfH8ayyIFVPM2sS4iVs4QTMznhIp5Xf:0Wkq3aTE1ZFMC8anqz
Static task
static1
Behavioral task
behavioral1
Sample
910b9bccc7e8a20e738b8ec139b3bb05_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
910b9bccc7e8a20e738b8ec139b3bb05_JaffaCakes118
-
Size
9.8MB
-
MD5
910b9bccc7e8a20e738b8ec139b3bb05
-
SHA1
8695d86c3cf698599b33bf9a825988cbb89f1f25
-
SHA256
a7749ac68f8ef308b5e771ea7c92e6973f9b65f0064d53b1a92a1223ae097000
-
SHA512
11d31431846edf9ec1187b3ff17fecfc789e1d4465074522f739bdd09c63f6e94c8e6197eadeff11f070f96cc843d53b3150fa25e54c6918cd7fed8dcee42df9
-
SSDEEP
196608:0WcV7gPcUELqkpfH8ayyIFVPM2sS4iVs4QTMznhIp5Xf:0Wkq3aTE1ZFMC8anqz
Score8/10-
Checks if the Android device is rooted.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-