General
-
Target
99576775979ce1b5fb61b3bdc612ea77_JaffaCakes118
-
Size
5.0MB
-
Sample
240605-1sv8ksac4z
-
MD5
99576775979ce1b5fb61b3bdc612ea77
-
SHA1
ccb9cb156e94d79ee25605c9dd603e1cc86e207f
-
SHA256
b24d359c328aac0f923113a6c7da8b917fd5c99cc9b663e80c11a1186ae40f6c
-
SHA512
e99ebadfbc2692dd0960a6f5a2ea5662893cb0a050bd93cbdb723bb481a72836d972d1f1ac7011f3b672fe556eb5e737f28e3f55ace130050fa8da67c45ac766
-
SSDEEP
98304:6GDzOuGhRPrU+SFqJ0poUUmDCSGvQLydaMwafNHQJ0:6G2HJruIpUHDCSGvQmdSUds0
Static task
static1
Behavioral task
behavioral1
Sample
99576775979ce1b5fb61b3bdc612ea77_JaffaCakes118.apk
Resource
android-x86-arm-20240603-en
Malware Config
Targets
-
-
Target
99576775979ce1b5fb61b3bdc612ea77_JaffaCakes118
-
Size
5.0MB
-
MD5
99576775979ce1b5fb61b3bdc612ea77
-
SHA1
ccb9cb156e94d79ee25605c9dd603e1cc86e207f
-
SHA256
b24d359c328aac0f923113a6c7da8b917fd5c99cc9b663e80c11a1186ae40f6c
-
SHA512
e99ebadfbc2692dd0960a6f5a2ea5662893cb0a050bd93cbdb723bb481a72836d972d1f1ac7011f3b672fe556eb5e737f28e3f55ace130050fa8da67c45ac766
-
SSDEEP
98304:6GDzOuGhRPrU+SFqJ0poUUmDCSGvQLydaMwafNHQJ0:6G2HJruIpUHDCSGvQmdSUds0
Score8/10-
Checks if the Android device is rooted.
-
Queries the phone number (MSISDN for GSM devices)
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the mobile country code (MCC)
-