General
-
Target
9526daf5dd0a92ca823767abf1567123_JaffaCakes118
-
Size
11.6MB
-
Sample
240604-rmda5sae85
-
MD5
9526daf5dd0a92ca823767abf1567123
-
SHA1
c28c4732a3fe48d5c1e1b2ac6f1740ebd09aa220
-
SHA256
959c8400e7731b94e7adc3753b250446862c26ccbb63387d4751cc2a9ec5c0be
-
SHA512
21f9877d017bb2ada1d1fbc1da517f66eed2c6952c51c928b07546d0673cd4e1b63d03748f70d762f83de65754115bfdd04ecb796b3122dd5492d41be7217487
-
SSDEEP
196608:XhMUbKwWn3grXRQW/UBBj2P+A8ZcLAa+VC18R8DXO7Nt4CblLqmwknonT0vfGoNv:xMUeMXRb/UPGl8Zq+6+M+7iionT0vf9v
Static task
static1
Behavioral task
behavioral1
Sample
9526daf5dd0a92ca823767abf1567123_JaffaCakes118.apk
Resource
android-x86-arm-20240603-en
Malware Config
Targets
-
-
Target
9526daf5dd0a92ca823767abf1567123_JaffaCakes118
-
Size
11.6MB
-
MD5
9526daf5dd0a92ca823767abf1567123
-
SHA1
c28c4732a3fe48d5c1e1b2ac6f1740ebd09aa220
-
SHA256
959c8400e7731b94e7adc3753b250446862c26ccbb63387d4751cc2a9ec5c0be
-
SHA512
21f9877d017bb2ada1d1fbc1da517f66eed2c6952c51c928b07546d0673cd4e1b63d03748f70d762f83de65754115bfdd04ecb796b3122dd5492d41be7217487
-
SSDEEP
196608:XhMUbKwWn3grXRQW/UBBj2P+A8ZcLAa+VC18R8DXO7Nt4CblLqmwknonT0vfGoNv:xMUeMXRb/UPGl8Zq+6+M+7iionT0vf9v
Score8/10-
Checks if the Android device is rooted.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-