General
-
Target
a427f8fde19a40fd2e360647f2d5d6b0_JaffaCakes118
-
Size
16.5MB
-
Sample
240613-g1fy3s1dmm
-
MD5
a427f8fde19a40fd2e360647f2d5d6b0
-
SHA1
47a8cfe907c0e3df9a0c04cc4609f6e7bca587b6
-
SHA256
05daeb2bf6e780f702bdf01a88bdb27357dd70a14cd1816ccd5a66148978cbf8
-
SHA512
ba530919229a7611becb8ae509c18f2a2e44bcecdbc418f15d2062939c18e4f519d673be66165712a69057d183ac5bd7f9902e8268921dcfbc417fb64a6ffa2b
-
SSDEEP
393216:V2817R4lH0/ijsN7CvczPOGghCJGZL2YiCakiQVgLnGy:0wVvf7CvcjOnhKs2YiFegLGy
Static task
static1
Behavioral task
behavioral1
Sample
a427f8fde19a40fd2e360647f2d5d6b0_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
Malware Config
Targets
-
-
Target
a427f8fde19a40fd2e360647f2d5d6b0_JaffaCakes118
-
Size
16.5MB
-
MD5
a427f8fde19a40fd2e360647f2d5d6b0
-
SHA1
47a8cfe907c0e3df9a0c04cc4609f6e7bca587b6
-
SHA256
05daeb2bf6e780f702bdf01a88bdb27357dd70a14cd1816ccd5a66148978cbf8
-
SHA512
ba530919229a7611becb8ae509c18f2a2e44bcecdbc418f15d2062939c18e4f519d673be66165712a69057d183ac5bd7f9902e8268921dcfbc417fb64a6ffa2b
-
SSDEEP
393216:V2817R4lH0/ijsN7CvczPOGghCJGZL2YiCakiQVgLnGy:0wVvf7CvcjOnhKs2YiFegLGy
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current nearby Wi-Fi networks
Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-