General
-
Target
97e3209459890704c5118c23d78744e5_JaffaCakes118
-
Size
30.4MB
-
Sample
240605-mm4qwaea49
-
MD5
97e3209459890704c5118c23d78744e5
-
SHA1
6ad970dbf60715c53c36dff30c81000d7fff1ab8
-
SHA256
c0b1cdb71765ce2e623eafa9b9f2d4469fe958bdf93fbfd4c1c9add3b7950270
-
SHA512
f2dabeeb3082e3c07daa70064fb1b16b69238c486c7e71e4dc8955f282095c2aec44eb843b9e6d3c3caf8050bf36b094bf7cc71809b5e55f34dbe84fc4a689f8
-
SSDEEP
786432:ggf/1RIC77yFMWjsFskZPQbsEoiaqj2F0wGbQPEzHH:D1SC77yS5s+PQbsBRqjW0wkz
Static task
static1
Behavioral task
behavioral1
Sample
97e3209459890704c5118c23d78744e5_JaffaCakes118.apk
Resource
android-x86-arm-20240603-en
Malware Config
Targets
-
-
Target
97e3209459890704c5118c23d78744e5_JaffaCakes118
-
Size
30.4MB
-
MD5
97e3209459890704c5118c23d78744e5
-
SHA1
6ad970dbf60715c53c36dff30c81000d7fff1ab8
-
SHA256
c0b1cdb71765ce2e623eafa9b9f2d4469fe958bdf93fbfd4c1c9add3b7950270
-
SHA512
f2dabeeb3082e3c07daa70064fb1b16b69238c486c7e71e4dc8955f282095c2aec44eb843b9e6d3c3caf8050bf36b094bf7cc71809b5e55f34dbe84fc4a689f8
-
SSDEEP
786432:ggf/1RIC77yFMWjsFskZPQbsEoiaqj2F0wGbQPEzHH:D1SC77yS5s+PQbsBRqjW0wkz
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Reads information about phone network operator.
-