General
-
Target
a374550974f89f158395db5cfe3e738a_JaffaCakes118
-
Size
30.1MB
-
Sample
240613-cb4avszfqf
-
MD5
a374550974f89f158395db5cfe3e738a
-
SHA1
955a10789da5a7fd011fd3c0d627b2ab14f4cd2e
-
SHA256
90da92b7fec812a091e192832428edbbe577993f00cd7696b5d25ad7bc5bd151
-
SHA512
e21d0d3d947f4930444dc7fa9a5b82cf342166dda68cc3d2abc270fbe1623ec970982b6cfaabae04e90834d42777e8332ca78c9abb88ae453b76abe20b4cad5a
-
SSDEEP
786432:0IVw1rIC73eQMZ+6BOcZPA/sEI8uIRFP78qKQvMIu/:21cC73evjOWPA/s1zIR178nF
Static task
static1
Behavioral task
behavioral1
Sample
a374550974f89f158395db5cfe3e738a_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
Malware Config
Targets
-
-
Target
a374550974f89f158395db5cfe3e738a_JaffaCakes118
-
Size
30.1MB
-
MD5
a374550974f89f158395db5cfe3e738a
-
SHA1
955a10789da5a7fd011fd3c0d627b2ab14f4cd2e
-
SHA256
90da92b7fec812a091e192832428edbbe577993f00cd7696b5d25ad7bc5bd151
-
SHA512
e21d0d3d947f4930444dc7fa9a5b82cf342166dda68cc3d2abc270fbe1623ec970982b6cfaabae04e90834d42777e8332ca78c9abb88ae453b76abe20b4cad5a
-
SSDEEP
786432:0IVw1rIC73eQMZ+6BOcZPA/sEI8uIRFP78qKQvMIu/:21cC73evjOWPA/s1zIR178nF
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Reads information about phone network operator.
-