General
-
Target
a4413aa9c35c9ccc09d3306a2521d99e_JaffaCakes118
-
Size
15.3MB
-
Sample
240613-hgg8gasbkn
-
MD5
a4413aa9c35c9ccc09d3306a2521d99e
-
SHA1
3357dea7e449996f0dfabc63c34973646ddd5755
-
SHA256
5c3056b2ba65b5fdd5bb6e81d8fb50276abfcccced1f40fc7d4eea7e9cb8c8b8
-
SHA512
0b3a0eea80f3f985fbeed6e31987c54ff0af327233053b876aaf753c5e8afad383fb72e9856cf040047cf8ce73797e8b5c9fdf95ceeb1a3c90d0058147a14c0b
-
SSDEEP
393216:Kwv7qaibajpy09eQQkYN6WcPTBgkvha8ReGfGuU:KwvWaiGjpXeB6WOTOyfa
Static task
static1
Behavioral task
behavioral1
Sample
a4413aa9c35c9ccc09d3306a2521d99e_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
Malware Config
Targets
-
-
Target
a4413aa9c35c9ccc09d3306a2521d99e_JaffaCakes118
-
Size
15.3MB
-
MD5
a4413aa9c35c9ccc09d3306a2521d99e
-
SHA1
3357dea7e449996f0dfabc63c34973646ddd5755
-
SHA256
5c3056b2ba65b5fdd5bb6e81d8fb50276abfcccced1f40fc7d4eea7e9cb8c8b8
-
SHA512
0b3a0eea80f3f985fbeed6e31987c54ff0af327233053b876aaf753c5e8afad383fb72e9856cf040047cf8ce73797e8b5c9fdf95ceeb1a3c90d0058147a14c0b
-
SSDEEP
393216:Kwv7qaibajpy09eQQkYN6WcPTBgkvha8ReGfGuU:KwvWaiGjpXeB6WOTOyfa
Score8/10-
Checks if the Android device is rooted.
-
Acquires the wake lock
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the mobile country code (MCC)
-
Reads information about phone network operator.
-
Checks the presence of a debugger
-