General
-
Target
96b82c620bc2034dff4d258f255b312b_JaffaCakes118
-
Size
22.5MB
-
Sample
240605-af667sga7w
-
MD5
96b82c620bc2034dff4d258f255b312b
-
SHA1
7779d261b0f5ef97d0a66dec6dfe2317ece8c56f
-
SHA256
38a92125bdc571f5c01f27b1012c505441cbad932896ef338bd0a58c63d367a4
-
SHA512
fb4d75a98fdcc5979836b427231b3583de1ae70c7f1ebc23ef870b0c10558852511198a9886ee9b2a0facaa59f415eacff59163d45dbd50b73a16e213aa0d7b3
-
SSDEEP
393216:WbygcW74+JemoIcmgykF6G7YYm/rIXbGXOkSoLgoHJi6NngLxF4deECHyqmaJbGp:WbxcD+BoIe0GdcryGXzbHJiiQWeXSqXC
Static task
static1
Behavioral task
behavioral1
Sample
96b82c620bc2034dff4d258f255b312b_JaffaCakes118.apk
Resource
android-x86-arm-20240603-en
Malware Config
Targets
-
-
Target
96b82c620bc2034dff4d258f255b312b_JaffaCakes118
-
Size
22.5MB
-
MD5
96b82c620bc2034dff4d258f255b312b
-
SHA1
7779d261b0f5ef97d0a66dec6dfe2317ece8c56f
-
SHA256
38a92125bdc571f5c01f27b1012c505441cbad932896ef338bd0a58c63d367a4
-
SHA512
fb4d75a98fdcc5979836b427231b3583de1ae70c7f1ebc23ef870b0c10558852511198a9886ee9b2a0facaa59f415eacff59163d45dbd50b73a16e213aa0d7b3
-
SSDEEP
393216:WbygcW74+JemoIcmgykF6G7YYm/rIXbGXOkSoLgoHJi6NngLxF4deECHyqmaJbGp:WbxcD+BoIe0GdcryGXzbHJiiQWeXSqXC
Score8/10-
Checks if the Android device is rooted.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-