General
-
Target
92ab0608e5deb4353fc13f0743ad0051_JaffaCakes118
-
Size
31.9MB
-
Sample
240603-wf1v3sfd65
-
MD5
92ab0608e5deb4353fc13f0743ad0051
-
SHA1
def7b2f040d0e866907547298c551659343685bc
-
SHA256
2c90c0049db6cc7abcacdd2b645d983912cfb5c3496fbb8613aee3eabafdc471
-
SHA512
cba61fbfc0dbcc5b05dfcbc76bb30c8fb1b6ba9128e1b792e4638ec23140c9961e6840023f64eb7afe8a8ceed143023b2a02f2c86ef0186dbaa62faf34ffdf3e
-
SSDEEP
786432:/8hQt1KxbrXmYVGWGcfZhpBDRz5I7BqMJ9U3:QQtQNrWYVdGkpVFTq0
Static task
static1
Behavioral task
behavioral1
Sample
92ab0608e5deb4353fc13f0743ad0051_JaffaCakes118.apk
Resource
android-x86-arm-20240603-en
Malware Config
Targets
-
-
Target
92ab0608e5deb4353fc13f0743ad0051_JaffaCakes118
-
Size
31.9MB
-
MD5
92ab0608e5deb4353fc13f0743ad0051
-
SHA1
def7b2f040d0e866907547298c551659343685bc
-
SHA256
2c90c0049db6cc7abcacdd2b645d983912cfb5c3496fbb8613aee3eabafdc471
-
SHA512
cba61fbfc0dbcc5b05dfcbc76bb30c8fb1b6ba9128e1b792e4638ec23140c9961e6840023f64eb7afe8a8ceed143023b2a02f2c86ef0186dbaa62faf34ffdf3e
-
SSDEEP
786432:/8hQt1KxbrXmYVGWGcfZhpBDRz5I7BqMJ9U3:QQtQNrWYVdGkpVFTq0
Score8/10-
Checks if the Android device is rooted.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-