General
-
Target
a52033c9bbccdf2d8829fe0999680b27_JaffaCakes118
-
Size
3.3MB
-
Sample
240613-mqyn2ayhqn
-
MD5
a52033c9bbccdf2d8829fe0999680b27
-
SHA1
344a3dabe59f2c1fe941b2abb991eff8ce0cad8d
-
SHA256
8fdc6ffc0e90b6527784ac984e672fcb3e893f45f524b5d3f56f4c621d55ef1f
-
SHA512
248a7496e385c9f3d62a86735fc5e3a6dcc2b50686613e92d7c28deac7048ef9742d53dd4ee3d48f3bd6a46eecc96c29a1f73b9c733c6283361fbdbbd32b8d77
-
SSDEEP
98304:5msKoQFnvKx7tNT/5r6SxBh3t2zrHGL9QBGYtjtEYU:XHQNKf95r6Sri09Qwh
Static task
static1
Behavioral task
behavioral1
Sample
a52033c9bbccdf2d8829fe0999680b27_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
Malware Config
Targets
-
-
Target
a52033c9bbccdf2d8829fe0999680b27_JaffaCakes118
-
Size
3.3MB
-
MD5
a52033c9bbccdf2d8829fe0999680b27
-
SHA1
344a3dabe59f2c1fe941b2abb991eff8ce0cad8d
-
SHA256
8fdc6ffc0e90b6527784ac984e672fcb3e893f45f524b5d3f56f4c621d55ef1f
-
SHA512
248a7496e385c9f3d62a86735fc5e3a6dcc2b50686613e92d7c28deac7048ef9742d53dd4ee3d48f3bd6a46eecc96c29a1f73b9c733c6283361fbdbbd32b8d77
-
SSDEEP
98304:5msKoQFnvKx7tNT/5r6SxBh3t2zrHGL9QBGYtjtEYU:XHQNKf95r6Sri09Qwh
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Listens for changes in the sensor environment (might be used to detect emulation)
-