General
-
Target
a5e04b3872554d76443ff6dae4aaa946_JaffaCakes118
-
Size
4.1MB
-
Sample
240613-q5tkea1fpd
-
MD5
a5e04b3872554d76443ff6dae4aaa946
-
SHA1
e3aea768fba1a76b34aef29e7389214094276081
-
SHA256
b2b774d6cf980716984a5f71831ed8c3f554069d97e3833805d4388b98d438f0
-
SHA512
d6e3dfb8186094e2112edb993f93cc8d2ec56ecf9bd3c7976eda1ca564b5b8e983250e10fd412bd612742b2e4a75cdd78eea67bc4ac2cad693a0857df2415bc1
-
SSDEEP
98304:3IJD4NQ3uGyUUPef1s2n9fYlk1B3kDvvcR2SgJBo/i:Yh4NPdWfGMwi2SgJd
Static task
static1
Behavioral task
behavioral1
Sample
a5e04b3872554d76443ff6dae4aaa946_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
Malware Config
Targets
-
-
Target
a5e04b3872554d76443ff6dae4aaa946_JaffaCakes118
-
Size
4.1MB
-
MD5
a5e04b3872554d76443ff6dae4aaa946
-
SHA1
e3aea768fba1a76b34aef29e7389214094276081
-
SHA256
b2b774d6cf980716984a5f71831ed8c3f554069d97e3833805d4388b98d438f0
-
SHA512
d6e3dfb8186094e2112edb993f93cc8d2ec56ecf9bd3c7976eda1ca564b5b8e983250e10fd412bd612742b2e4a75cdd78eea67bc4ac2cad693a0857df2415bc1
-
SSDEEP
98304:3IJD4NQ3uGyUUPef1s2n9fYlk1B3kDvvcR2SgJBo/i:Yh4NPdWfGMwi2SgJd
Score8/10-
Checks if the Android device is rooted.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-