General
-
Target
a408440e12dd4d74902d09911ea4832b_JaffaCakes118
-
Size
8.0MB
-
Sample
240613-gc8n7azdrj
-
MD5
a408440e12dd4d74902d09911ea4832b
-
SHA1
fe67931e553e59f500efb0f530fe284538962a51
-
SHA256
9c91f511a4c6d71f59cac878c6948143033e0876a30d8f83090777f58c6b98c6
-
SHA512
c6ebdcf8398fc849fd7ee82f420c56ffac59b86a83b42fb5b1c1ba7798c3791d72610aa93e68d57c8ccf9448248a71ef0310a6057ffa0252cc7ccfc46cf02afe
-
SSDEEP
196608:RAZrxrGMqtnjq2NXeXL2QshLzc+s6LNuVy9Dn63G42vtxEw2:S9ZJijFNXeXShLAM8VyxZvPE1
Static task
static1
Behavioral task
behavioral1
Sample
a408440e12dd4d74902d09911ea4832b_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
Behavioral task
behavioral2
Sample
a408440e12dd4d74902d09911ea4832b_JaffaCakes118.apk
Resource
android-x64-arm64-20240611.1-en
Malware Config
Targets
-
-
Target
a408440e12dd4d74902d09911ea4832b_JaffaCakes118
-
Size
8.0MB
-
MD5
a408440e12dd4d74902d09911ea4832b
-
SHA1
fe67931e553e59f500efb0f530fe284538962a51
-
SHA256
9c91f511a4c6d71f59cac878c6948143033e0876a30d8f83090777f58c6b98c6
-
SHA512
c6ebdcf8398fc849fd7ee82f420c56ffac59b86a83b42fb5b1c1ba7798c3791d72610aa93e68d57c8ccf9448248a71ef0310a6057ffa0252cc7ccfc46cf02afe
-
SSDEEP
196608:RAZrxrGMqtnjq2NXeXL2QshLzc+s6LNuVy9Dn63G42vtxEw2:S9ZJijFNXeXShLAM8VyxZvPE1
Score8/10-
Checks if the Android device is rooted.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Checks the presence of a debugger
-