General
-
Target
9aaa4b00e863e3301c5b6767a8fa884d_JaffaCakes118
-
Size
13.0MB
-
Sample
240610-pmn2javcrb
-
MD5
9aaa4b00e863e3301c5b6767a8fa884d
-
SHA1
3144765530875c456d069616e3f6dcea842e9810
-
SHA256
71e213c5adfe972ff62171686e87937417e426a0edab16c33c836a667e9c5605
-
SHA512
7dee4d369606458644d876b15cf58df23057bbe8987bee2092b46d2cbe1a98de5bd117afdaad41f6af0c82a49b226e0fb9c6c8a2fb0b4c5ae5f25148cc346ceb
-
SSDEEP
196608:ZTfFTJfFTw+gr1EkcotAeePU7eEeGrhm740ukTX9MveSttmPzFeiDnw0:9FNF4GkZAXU9Jhm00ukyeVrd
Static task
static1
Behavioral task
behavioral1
Sample
9aaa4b00e863e3301c5b6767a8fa884d_JaffaCakes118.apk
Resource
android-x86-arm-20240603-en
Behavioral task
behavioral2
Sample
9aaa4b00e863e3301c5b6767a8fa884d_JaffaCakes118.apk
Resource
android-x64-20240603-en
Malware Config
Targets
-
-
Target
9aaa4b00e863e3301c5b6767a8fa884d_JaffaCakes118
-
Size
13.0MB
-
MD5
9aaa4b00e863e3301c5b6767a8fa884d
-
SHA1
3144765530875c456d069616e3f6dcea842e9810
-
SHA256
71e213c5adfe972ff62171686e87937417e426a0edab16c33c836a667e9c5605
-
SHA512
7dee4d369606458644d876b15cf58df23057bbe8987bee2092b46d2cbe1a98de5bd117afdaad41f6af0c82a49b226e0fb9c6c8a2fb0b4c5ae5f25148cc346ceb
-
SSDEEP
196608:ZTfFTJfFTw+gr1EkcotAeePU7eEeGrhm740ukTX9MveSttmPzFeiDnw0:9FNF4GkZAXU9Jhm00ukyeVrd
Score8/10-
Checks if the Android device is rooted.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the unique device ID (IMEI, MEID, IMSI)
-