General
-
Target
a7b29ced6a0601cd1c39dfcccffd1a14_JaffaCakes118
-
Size
25.6MB
-
Sample
240614-crmcaavhrp
-
MD5
a7b29ced6a0601cd1c39dfcccffd1a14
-
SHA1
5d89fbca2c9289a8d8b2cdc8cca2259d32c90c3d
-
SHA256
957ef5c2ef5efbacb1469fb55de10c0a77169c77de8467b7ba5362530cdc8442
-
SHA512
253f0bf3a887d4e1f49d0586f9a71e63e2709e318b98a936f71aa6175f3b3585da84fd93d3885838461ff33b25bb4b5b00e0204ddfcd37c95cf35e126584aeec
-
SSDEEP
393216:U82k2Oj6viZeQLFkH+H/kSHrDPLE/hrDPL79+bHzx9oo5OCrLRuYPNzV4yGc7T55:8k2mZxGeH/PHqHobHzxz/vrNiVcPY6
Static task
static1
Behavioral task
behavioral1
Sample
a7b29ced6a0601cd1c39dfcccffd1a14_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
Malware Config
Targets
-
-
Target
a7b29ced6a0601cd1c39dfcccffd1a14_JaffaCakes118
-
Size
25.6MB
-
MD5
a7b29ced6a0601cd1c39dfcccffd1a14
-
SHA1
5d89fbca2c9289a8d8b2cdc8cca2259d32c90c3d
-
SHA256
957ef5c2ef5efbacb1469fb55de10c0a77169c77de8467b7ba5362530cdc8442
-
SHA512
253f0bf3a887d4e1f49d0586f9a71e63e2709e318b98a936f71aa6175f3b3585da84fd93d3885838461ff33b25bb4b5b00e0204ddfcd37c95cf35e126584aeec
-
SSDEEP
393216:U82k2Oj6viZeQLFkH+H/kSHrDPLE/hrDPL79+bHzx9oo5OCrLRuYPNzV4yGc7T55:8k2mZxGeH/PHqHobHzxz/vrNiVcPY6
Score8/10-
Checks if the Android device is rooted.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-