General
-
Target
9b03ce94ebcd7bf3f76ff3f2eddd7ea7_JaffaCakes118
-
Size
15.6MB
-
Sample
240610-rz4zmazbpb
-
MD5
9b03ce94ebcd7bf3f76ff3f2eddd7ea7
-
SHA1
ab813aec5aa098f618e149e0b307d5fa906ea8ca
-
SHA256
96a703860b47f7eed9f357fd2ef1a1cc78f691c4325bb4a5e9d6958973fd1d2e
-
SHA512
28b3db3de3a6651537b3137c88e9af9cd79ec673b506944072d5180ab8f02aeb310d2b06a1236233fc8dcb887067c98a023f8c7445a057b93fa8316db6ac23ab
-
SSDEEP
393216:uhu+4SokC7y4I4aUPQ5YfdC9M8VzLINTUdcjnQTfNzsG:AAH7yofPQ5Yfo/VzE9Udq81gG
Static task
static1
Behavioral task
behavioral1
Sample
9b03ce94ebcd7bf3f76ff3f2eddd7ea7_JaffaCakes118.apk
Resource
android-x86-arm-20240603-en
Malware Config
Targets
-
-
Target
9b03ce94ebcd7bf3f76ff3f2eddd7ea7_JaffaCakes118
-
Size
15.6MB
-
MD5
9b03ce94ebcd7bf3f76ff3f2eddd7ea7
-
SHA1
ab813aec5aa098f618e149e0b307d5fa906ea8ca
-
SHA256
96a703860b47f7eed9f357fd2ef1a1cc78f691c4325bb4a5e9d6958973fd1d2e
-
SHA512
28b3db3de3a6651537b3137c88e9af9cd79ec673b506944072d5180ab8f02aeb310d2b06a1236233fc8dcb887067c98a023f8c7445a057b93fa8316db6ac23ab
-
SSDEEP
393216:uhu+4SokC7y4I4aUPQ5YfdC9M8VzLINTUdcjnQTfNzsG:AAH7yofPQ5Yfo/VzE9Udq81gG
Score8/10-
Checks if the Android device is rooted.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-