General
-
Target
989a73bcb31834ff7f7c8c6c4d8d777e_JaffaCakes118
-
Size
5.4MB
-
Sample
240605-tqmp4ace75
-
MD5
989a73bcb31834ff7f7c8c6c4d8d777e
-
SHA1
5a3e33fa1e95d238d691199836c486824ece630b
-
SHA256
25bd204c49eea67a0d2547548ad8ad90066a37d8c59feac85659c39b960e1a47
-
SHA512
8d64d37f5dd3e2eab6eda2e0f30bb04a83c78e58cf09b0169630d97c6316032de4c811b81c25647e01afa140021e0bbf0f901aa1047d6640b9eed4aaf4e927ec
-
SSDEEP
98304:6tEk1LyGRHGCT9WMb14Dd/135P1CsqPylSSLzNt0GI7pVJtEQ/77F6max+X51O:6tEk1mGdGsb14DjpQXq4pVJ6Y7MmawO
Static task
static1
Behavioral task
behavioral1
Sample
989a73bcb31834ff7f7c8c6c4d8d777e_JaffaCakes118.apk
Resource
android-x86-arm-20240603-en
Behavioral task
behavioral2
Sample
989a73bcb31834ff7f7c8c6c4d8d777e_JaffaCakes118.apk
Resource
android-x64-arm64-20240603-en
Malware Config
Targets
-
-
Target
989a73bcb31834ff7f7c8c6c4d8d777e_JaffaCakes118
-
Size
5.4MB
-
MD5
989a73bcb31834ff7f7c8c6c4d8d777e
-
SHA1
5a3e33fa1e95d238d691199836c486824ece630b
-
SHA256
25bd204c49eea67a0d2547548ad8ad90066a37d8c59feac85659c39b960e1a47
-
SHA512
8d64d37f5dd3e2eab6eda2e0f30bb04a83c78e58cf09b0169630d97c6316032de4c811b81c25647e01afa140021e0bbf0f901aa1047d6640b9eed4aaf4e927ec
-
SSDEEP
98304:6tEk1LyGRHGCT9WMb14Dd/135P1CsqPylSSLzNt0GI7pVJtEQ/77F6max+X51O:6tEk1mGdGsb14DjpQXq4pVJ6Y7MmawO
-
Checks if the Android device is rooted.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-