General
-
Target
a4603bd6975a86ea3e8303ff1cfa69cc_JaffaCakes118
-
Size
30.2MB
-
Sample
240613-h3bmtashkl
-
MD5
a4603bd6975a86ea3e8303ff1cfa69cc
-
SHA1
ca39a254d924aa8617100bfe562e4c17e167ec36
-
SHA256
327c01ee8fadb9e62cafb12dccda1dc3121f8765530e442706d45f955f98314c
-
SHA512
0d79d96679870bc31c0f12ed2eb2a4ffc8ab9ecc98b71af13f8e5371c32d7b6bdadd6ba840cf52f75525b0fb8acfdc035d9cbd7f837dfd1ffe2ac2eae0e9c32d
-
SSDEEP
786432:Ug3H1wIC7L+cMFy2duTZPoTsEIKzi32sQAyzQDXHni:n13C7L+jDulPoTsVIi3nQATC
Static task
static1
Behavioral task
behavioral1
Sample
a4603bd6975a86ea3e8303ff1cfa69cc_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
Malware Config
Targets
-
-
Target
a4603bd6975a86ea3e8303ff1cfa69cc_JaffaCakes118
-
Size
30.2MB
-
MD5
a4603bd6975a86ea3e8303ff1cfa69cc
-
SHA1
ca39a254d924aa8617100bfe562e4c17e167ec36
-
SHA256
327c01ee8fadb9e62cafb12dccda1dc3121f8765530e442706d45f955f98314c
-
SHA512
0d79d96679870bc31c0f12ed2eb2a4ffc8ab9ecc98b71af13f8e5371c32d7b6bdadd6ba840cf52f75525b0fb8acfdc035d9cbd7f837dfd1ffe2ac2eae0e9c32d
-
SSDEEP
786432:Ug3H1wIC7L+cMFy2duTZPoTsEIKzi32sQAyzQDXHni:n13C7L+jDulPoTsVIi3nQATC
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Reads information about phone network operator.
-