General
-
Target
9af947b072b2ea40ab6e5ff3b980a919_JaffaCakes118
-
Size
11.4MB
-
Sample
240610-rql3fsygjg
-
MD5
9af947b072b2ea40ab6e5ff3b980a919
-
SHA1
fa7a92a0d054aa8946a0e34803105a536b22b9c0
-
SHA256
22109dba4c94581ceab286e1f3aa88f510ec963e9e3ba324c964c31798abff6e
-
SHA512
19673ca6f00b3f1ef14fac1bfbc34a20d13e4cd3c1bdc58df30e44dcab7d46a379e99a1acc67f1d2bade738e9c0890ca1b2a607506c0ac4d549afd4afe61fd2d
-
SSDEEP
196608:gHV27+Ps5fYDR5nbMKmPHets9MurhZ1MQwVmXTkNoFbCNE1VfWaOb1d:gH65f05IKmvgur1MQwVQbCNmVfWaObb
Static task
static1
Behavioral task
behavioral1
Sample
9af947b072b2ea40ab6e5ff3b980a919_JaffaCakes118.apk
Resource
android-x86-arm-20240603-en
Malware Config
Targets
-
-
Target
9af947b072b2ea40ab6e5ff3b980a919_JaffaCakes118
-
Size
11.4MB
-
MD5
9af947b072b2ea40ab6e5ff3b980a919
-
SHA1
fa7a92a0d054aa8946a0e34803105a536b22b9c0
-
SHA256
22109dba4c94581ceab286e1f3aa88f510ec963e9e3ba324c964c31798abff6e
-
SHA512
19673ca6f00b3f1ef14fac1bfbc34a20d13e4cd3c1bdc58df30e44dcab7d46a379e99a1acc67f1d2bade738e9c0890ca1b2a607506c0ac4d549afd4afe61fd2d
-
SSDEEP
196608:gHV27+Ps5fYDR5nbMKmPHets9MurhZ1MQwVmXTkNoFbCNE1VfWaOb1d:gH65f05IKmvgur1MQwVQbCNmVfWaObb
Score8/10-
Checks if the Android device is rooted.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-