General
-
Target
9149235126e4fc9164796fcf465843fe_JaffaCakes118
-
Size
10.2MB
-
Sample
240603-lf31bsab3y
-
MD5
9149235126e4fc9164796fcf465843fe
-
SHA1
510925fb8a65691da603229fe2d96afe25a6df58
-
SHA256
e052d0ce6f5f2946108ed527cb9482fe6bcf7c98de9183e3eaf8ca9d71d6697f
-
SHA512
f987aaa7318c45d4a24a0cee81c34778afc069004f3ed24dd5469b5a24642c201b01b29a7b04fe13ce8ba8277df5fff5e23dd3e36bf88587d03325c61137e1bf
-
SSDEEP
196608:qDUJxTCy6adBKQvTIDLJuiErmMC1gUwE3bJmT9/fdFZ9a3DJiJuD+dU7yjA8:tPTv6afdEUiErtqpFWdN8JiADaU7yc8
Static task
static1
Behavioral task
behavioral1
Sample
9149235126e4fc9164796fcf465843fe_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
9149235126e4fc9164796fcf465843fe_JaffaCakes118
-
Size
10.2MB
-
MD5
9149235126e4fc9164796fcf465843fe
-
SHA1
510925fb8a65691da603229fe2d96afe25a6df58
-
SHA256
e052d0ce6f5f2946108ed527cb9482fe6bcf7c98de9183e3eaf8ca9d71d6697f
-
SHA512
f987aaa7318c45d4a24a0cee81c34778afc069004f3ed24dd5469b5a24642c201b01b29a7b04fe13ce8ba8277df5fff5e23dd3e36bf88587d03325c61137e1bf
-
SSDEEP
196608:qDUJxTCy6adBKQvTIDLJuiErmMC1gUwE3bJmT9/fdFZ9a3DJiJuD+dU7yjA8:tPTv6afdEUiErtqpFWdN8JiADaU7yc8
Score8/10-
Checks if the Android device is rooted.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-