General
-
Target
98558ce5bb1da13b7a7d413a04742567_JaffaCakes118
-
Size
28.3MB
-
Sample
240605-q8v8eahh72
-
MD5
98558ce5bb1da13b7a7d413a04742567
-
SHA1
11667e83db20cf03d63622c05fd4451a5a59e3fc
-
SHA256
68bb6b867c352e1720f6e2db332a80daf190c66df052a3c798bde3783f3a81d0
-
SHA512
c5f25e754be7553da79d6f214ab80e3a89661ded4e737e4c7a5e667fa74e821c880dc9a6a0f80632a363b92ab2f04f8f56bc90cb2de0b6293d7e3e0ea052df29
-
SSDEEP
786432:eOiKx6g/Yu5bL+JywWn2IYCBdSOsZtQGxcFJUoq8kUC:edKxFcJh02NBaGxcPUoqlUC
Static task
static1
Behavioral task
behavioral1
Sample
98558ce5bb1da13b7a7d413a04742567_JaffaCakes118.apk
Resource
android-x86-arm-20240603-en
Malware Config
Targets
-
-
Target
98558ce5bb1da13b7a7d413a04742567_JaffaCakes118
-
Size
28.3MB
-
MD5
98558ce5bb1da13b7a7d413a04742567
-
SHA1
11667e83db20cf03d63622c05fd4451a5a59e3fc
-
SHA256
68bb6b867c352e1720f6e2db332a80daf190c66df052a3c798bde3783f3a81d0
-
SHA512
c5f25e754be7553da79d6f214ab80e3a89661ded4e737e4c7a5e667fa74e821c880dc9a6a0f80632a363b92ab2f04f8f56bc90cb2de0b6293d7e3e0ea052df29
-
SSDEEP
786432:eOiKx6g/Yu5bL+JywWn2IYCBdSOsZtQGxcFJUoq8kUC:edKxFcJh02NBaGxcPUoqlUC
Score8/10-
Checks if the Android device is rooted.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-