General
-
Target
99911a73a7815cf1401934c9d1f40adf_JaffaCakes118
-
Size
17.9MB
-
Sample
240605-3ylbnscc41
-
MD5
99911a73a7815cf1401934c9d1f40adf
-
SHA1
b9d3d84f43128729f03386c5533b54bb5f80ce7f
-
SHA256
e4d0a8fc9d06a98e23967dcf30d3b3f0a1403840edcd197d8415193fd087a35f
-
SHA512
afda063d480ab033b20e39763cdf3b21a9e9f103df8261e80d1f802f291c3d121ed82beb23336cb643856c25129a5d3c9cc211196a1ed1b75c2870f49b7739f2
-
SSDEEP
393216:+4nnA8rloLpiOt1CkKhaGQisdv9ThRJAr0Nb06z9sflgAaVH4RZig:+4A8rSpJOcGBQ9ThN1JygA7r
Static task
static1
Behavioral task
behavioral1
Sample
99911a73a7815cf1401934c9d1f40adf_JaffaCakes118.apk
Resource
android-x86-arm-20240603-en
Malware Config
Targets
-
-
Target
99911a73a7815cf1401934c9d1f40adf_JaffaCakes118
-
Size
17.9MB
-
MD5
99911a73a7815cf1401934c9d1f40adf
-
SHA1
b9d3d84f43128729f03386c5533b54bb5f80ce7f
-
SHA256
e4d0a8fc9d06a98e23967dcf30d3b3f0a1403840edcd197d8415193fd087a35f
-
SHA512
afda063d480ab033b20e39763cdf3b21a9e9f103df8261e80d1f802f291c3d121ed82beb23336cb643856c25129a5d3c9cc211196a1ed1b75c2870f49b7739f2
-
SSDEEP
393216:+4nnA8rloLpiOt1CkKhaGQisdv9ThRJAr0Nb06z9sflgAaVH4RZig:+4A8rSpJOcGBQ9ThN1JygA7r
Score8/10-
Checks if the Android device is rooted.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-