General
-
Target
9af9557a2e2eba9a80603ced9a807ad9_JaffaCakes118
-
Size
16.4MB
-
Sample
240610-rqsj8szckn
-
MD5
9af9557a2e2eba9a80603ced9a807ad9
-
SHA1
07cb2a87b6834445a8bc03f37ca619b0f0295c96
-
SHA256
25097f028bdf5bb1cb7986d09cd8e86d621cee18c747d2cd582b6a091fe79982
-
SHA512
947d8a3616d10a725308695f762a85bc93a6cc40da1320289165ee8622c5b07703dee951471f72b69ee2aa53ec1766c884786ec2968622fdad4a693ac105d74c
-
SSDEEP
393216:gnjfWH/Hxco45aQpuG1zeZ/icYjukwYM/03sTDI/KKX:gjS/xcoibpX16ej5wY3s/I/b
Static task
static1
Behavioral task
behavioral1
Sample
9af9557a2e2eba9a80603ced9a807ad9_JaffaCakes118.apk
Resource
android-x86-arm-20240603-en
Malware Config
Targets
-
-
Target
9af9557a2e2eba9a80603ced9a807ad9_JaffaCakes118
-
Size
16.4MB
-
MD5
9af9557a2e2eba9a80603ced9a807ad9
-
SHA1
07cb2a87b6834445a8bc03f37ca619b0f0295c96
-
SHA256
25097f028bdf5bb1cb7986d09cd8e86d621cee18c747d2cd582b6a091fe79982
-
SHA512
947d8a3616d10a725308695f762a85bc93a6cc40da1320289165ee8622c5b07703dee951471f72b69ee2aa53ec1766c884786ec2968622fdad4a693ac105d74c
-
SSDEEP
393216:gnjfWH/Hxco45aQpuG1zeZ/icYjukwYM/03sTDI/KKX:gjS/xcoibpX16ej5wY3s/I/b
Score8/10-
Checks if the Android device is rooted.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-