General
-
Target
a69049619988d9771ef07c24acdce15d_JaffaCakes118
-
Size
30.2MB
-
Sample
240613-t83t2awhmd
-
MD5
a69049619988d9771ef07c24acdce15d
-
SHA1
5b76c0607f1d7aa36b7ca16fd0595131e60e9ec8
-
SHA256
fd9236344f31ac19dcd7a9b7a70f915045cbfbd7195442de71d9632b4337e125
-
SHA512
84a2b0597ba361d5a82e5e87fdd0557b1288ab99cf1124138938dcccfb2eed519807b00b6b20b7d44a5eb7bf0f4b5b5da9de0ec1eae95ce6f40fdd30b39b4ddc
-
SSDEEP
786432:3vgvi1cIC7/KyMT06BGiZPWpsEASuqDphJoCwQzEyUe:331TC7/KJ7GAPWpshFqDfJoJY
Static task
static1
Behavioral task
behavioral1
Sample
a69049619988d9771ef07c24acdce15d_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
Malware Config
Targets
-
-
Target
a69049619988d9771ef07c24acdce15d_JaffaCakes118
-
Size
30.2MB
-
MD5
a69049619988d9771ef07c24acdce15d
-
SHA1
5b76c0607f1d7aa36b7ca16fd0595131e60e9ec8
-
SHA256
fd9236344f31ac19dcd7a9b7a70f915045cbfbd7195442de71d9632b4337e125
-
SHA512
84a2b0597ba361d5a82e5e87fdd0557b1288ab99cf1124138938dcccfb2eed519807b00b6b20b7d44a5eb7bf0f4b5b5da9de0ec1eae95ce6f40fdd30b39b4ddc
-
SSDEEP
786432:3vgvi1cIC7/KyMT06BGiZPWpsEASuqDphJoCwQzEyUe:331TC7/KJ7GAPWpshFqDfJoJY
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Reads information about phone network operator.
-