General
-
Target
9587c56ffcba34ee870453976de7edbb_JaffaCakes118
-
Size
13.4MB
-
Sample
240604-tz1nbacg8t
-
MD5
9587c56ffcba34ee870453976de7edbb
-
SHA1
23d972174c5049341823befd3bb12f2b2446a254
-
SHA256
76d0a699595ac7573352850185435a73d8cac8109f468d2081265d9ce7c446c4
-
SHA512
ca980f0252a1ecf42c608f329bfa7f484140e7563078e49b6fecabbab1d547968ec8caf3e90bf69186c260d219432d75e90f84e3b0ab1c26cb997c14e29cd894
-
SSDEEP
393216:SED703cJHlgv+UoZejQszwz7zJ+BSugpk:SL3qlgGUoXl7qgpk
Static task
static1
Behavioral task
behavioral1
Sample
9587c56ffcba34ee870453976de7edbb_JaffaCakes118.apk
Resource
android-x86-arm-20240603-en
Malware Config
Targets
-
-
Target
9587c56ffcba34ee870453976de7edbb_JaffaCakes118
-
Size
13.4MB
-
MD5
9587c56ffcba34ee870453976de7edbb
-
SHA1
23d972174c5049341823befd3bb12f2b2446a254
-
SHA256
76d0a699595ac7573352850185435a73d8cac8109f468d2081265d9ce7c446c4
-
SHA512
ca980f0252a1ecf42c608f329bfa7f484140e7563078e49b6fecabbab1d547968ec8caf3e90bf69186c260d219432d75e90f84e3b0ab1c26cb997c14e29cd894
-
SSDEEP
393216:SED703cJHlgv+UoZejQszwz7zJ+BSugpk:SL3qlgGUoXl7qgpk
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the mobile country code (MCC)
-