General
-
Target
a3dc92f199e42cfc32917137a76af620_JaffaCakes118
-
Size
5.4MB
-
Sample
240613-fdg27avclb
-
MD5
a3dc92f199e42cfc32917137a76af620
-
SHA1
386d188c63fef38589a047d0dfba2637727cd202
-
SHA256
c16de6dd0e8c317960b4d8d9798bf7bc0078e4417ca91c0c0f34ca4b7ccd6697
-
SHA512
39f1d0a674af543c44324529661288b7ae8c5cafd9b883f16a7a0fa31dfc652a7c11c092547224f6de90b82d89e07377ab23aac5e1c77503e6b739821a115e5e
-
SSDEEP
98304:wE7M+YdWFBw6fVmvSnAMltxoP2wDBDqhZi6P1rCHGCHybv:wEg+lI6fQOiewdDeo6P1rCmCe
Static task
static1
Behavioral task
behavioral1
Sample
a3dc92f199e42cfc32917137a76af620_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
Malware Config
Targets
-
-
Target
a3dc92f199e42cfc32917137a76af620_JaffaCakes118
-
Size
5.4MB
-
MD5
a3dc92f199e42cfc32917137a76af620
-
SHA1
386d188c63fef38589a047d0dfba2637727cd202
-
SHA256
c16de6dd0e8c317960b4d8d9798bf7bc0078e4417ca91c0c0f34ca4b7ccd6697
-
SHA512
39f1d0a674af543c44324529661288b7ae8c5cafd9b883f16a7a0fa31dfc652a7c11c092547224f6de90b82d89e07377ab23aac5e1c77503e6b739821a115e5e
-
SSDEEP
98304:wE7M+YdWFBw6fVmvSnAMltxoP2wDBDqhZi6P1rCHGCHybv:wEg+lI6fQOiewdDeo6P1rCmCe
Score8/10-
Checks if the Android device is rooted.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-