General
-
Target
983a28131f438a47c5fcc8cacef11176_JaffaCakes118
-
Size
31.4MB
-
Sample
240605-p7xt6sga6w
-
MD5
983a28131f438a47c5fcc8cacef11176
-
SHA1
d08fe907eb12b4c08e2100b8afe7bfc22ada1769
-
SHA256
c5a81cd05b3f7f8c8a0a17f0fe8cf62db7bc3b0f4d36468563241ad16d89ddce
-
SHA512
df83a4e6e643024761d71fd3ed7b95aa2b400188ebd5b9d24b0edd44be9bc7b094f9051ff70f2959e4bdc5d16f90ef5d074c479cdb24c4d0afbc753cf96e8bc4
-
SSDEEP
786432:dCqGEJ0crqVvMA8rsC+MogRn8XcZcVpcISVCOC1QTwcAhJ6:dzGSRubcsCrJryDvSVCOC1QTwcAG
Static task
static1
Behavioral task
behavioral1
Sample
983a28131f438a47c5fcc8cacef11176_JaffaCakes118.apk
Resource
android-x86-arm-20240603-en
Malware Config
Targets
-
-
Target
983a28131f438a47c5fcc8cacef11176_JaffaCakes118
-
Size
31.4MB
-
MD5
983a28131f438a47c5fcc8cacef11176
-
SHA1
d08fe907eb12b4c08e2100b8afe7bfc22ada1769
-
SHA256
c5a81cd05b3f7f8c8a0a17f0fe8cf62db7bc3b0f4d36468563241ad16d89ddce
-
SHA512
df83a4e6e643024761d71fd3ed7b95aa2b400188ebd5b9d24b0edd44be9bc7b094f9051ff70f2959e4bdc5d16f90ef5d074c479cdb24c4d0afbc753cf96e8bc4
-
SSDEEP
786432:dCqGEJ0crqVvMA8rsC+MogRn8XcZcVpcISVCOC1QTwcAhJ6:dzGSRubcsCrJryDvSVCOC1QTwcAG
Score8/10-
Checks if the Android device is rooted.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-