General
-
Target
95fdf2b128cd0fe49691ceca2022f256_JaffaCakes118
-
Size
9.0MB
-
Sample
240604-x53lmsgh4z
-
MD5
95fdf2b128cd0fe49691ceca2022f256
-
SHA1
331af6ae694b3ef0ab0d04080d9528c96ce85de7
-
SHA256
d9582d58fe1330a7ba42832753b3935151746c8c0037711aa79546e6f5296993
-
SHA512
15025d8d2c1a703b33eb8ab8d97a8a6a018d166c25256a8a77f128b41389155f5a782478ace344763fa5f950e4c3bcd4a405a8ba54a8978649ad513821945206
-
SSDEEP
196608:PXaHcwl1YPe5jR3540KJ6pr+DgQR5vr6cz0S8h+loFKK1RceTy3m:PdwI25U0KUpr+DRN70S82eT1RNt
Static task
static1
Behavioral task
behavioral1
Sample
95fdf2b128cd0fe49691ceca2022f256_JaffaCakes118.apk
Resource
android-x86-arm-20240603-en
Malware Config
Targets
-
-
Target
95fdf2b128cd0fe49691ceca2022f256_JaffaCakes118
-
Size
9.0MB
-
MD5
95fdf2b128cd0fe49691ceca2022f256
-
SHA1
331af6ae694b3ef0ab0d04080d9528c96ce85de7
-
SHA256
d9582d58fe1330a7ba42832753b3935151746c8c0037711aa79546e6f5296993
-
SHA512
15025d8d2c1a703b33eb8ab8d97a8a6a018d166c25256a8a77f128b41389155f5a782478ace344763fa5f950e4c3bcd4a405a8ba54a8978649ad513821945206
-
SSDEEP
196608:PXaHcwl1YPe5jR3540KJ6pr+DgQR5vr6cz0S8h+loFKK1RceTy3m:PdwI25U0KUpr+DRN70S82eT1RNt
Score8/10-
Checks if the Android device is rooted.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-