General
-
Target
9b0edac3ec8f8efc184a7ee10c30fab8_JaffaCakes118
-
Size
30.4MB
-
Sample
240610-r789ba1aqp
-
MD5
9b0edac3ec8f8efc184a7ee10c30fab8
-
SHA1
d1fd45bc872d5a95f864c6b1afbc2f07ac1be54d
-
SHA256
e301dc8652d3303efb38baf37e78a2638af788baf68891102d906d648eedfb8e
-
SHA512
ddfffac452df5a5564d4e0b6535a85f4014d44db2e04ce1bec2f9aaed2b10b503bcc4baea422a190c342375a0c823411673ee9fd13777e6946d7554ca9ca586b
-
SSDEEP
786432:0MRB1pIC7XK/Mj9gxAqZPnTsEGpLxQq/mUOFQHZZt+:71aC7XKEEAoPnTsrBxQcmUTm
Static task
static1
Behavioral task
behavioral1
Sample
9b0edac3ec8f8efc184a7ee10c30fab8_JaffaCakes118.apk
Resource
android-x86-arm-20240603-en
Malware Config
Targets
-
-
Target
9b0edac3ec8f8efc184a7ee10c30fab8_JaffaCakes118
-
Size
30.4MB
-
MD5
9b0edac3ec8f8efc184a7ee10c30fab8
-
SHA1
d1fd45bc872d5a95f864c6b1afbc2f07ac1be54d
-
SHA256
e301dc8652d3303efb38baf37e78a2638af788baf68891102d906d648eedfb8e
-
SHA512
ddfffac452df5a5564d4e0b6535a85f4014d44db2e04ce1bec2f9aaed2b10b503bcc4baea422a190c342375a0c823411673ee9fd13777e6946d7554ca9ca586b
-
SSDEEP
786432:0MRB1pIC7XK/Mj9gxAqZPnTsEGpLxQq/mUOFQHZZt+:71aC7XKEEAoPnTsrBxQcmUTm
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Reads information about phone network operator.
-