General
-
Target
a7b300a4306b875f1b1da5a4e10748e2_JaffaCakes118
-
Size
5.4MB
-
Sample
240614-csj9bawakp
-
MD5
a7b300a4306b875f1b1da5a4e10748e2
-
SHA1
86d9caa516bcd1c734e29a3d6ad001bb0173e261
-
SHA256
2a3109cf0607c79ad20893bbcc9ba6f4b59dcf50ff2f37d0a0c0b113e4329bd2
-
SHA512
9cb917fce83e75c4665affc7a1768186e5c3736a0f9cb6a4b6277665c5f95dc9697f738766faf48d0054a8b7fc5394c98aaa03044001a8ff32f5d646cc8a4f19
-
SSDEEP
98304:Qa8IG1em4SOUsALcOHAnGr7cc13PcJ4baPBhpZ0l4SODBzjXs66dRCiBiZX8SjvJ:QrH1T4SOdQmn8QEcJ4baVs4SOobBi184
Static task
static1
Behavioral task
behavioral1
Sample
a7b300a4306b875f1b1da5a4e10748e2_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
Malware Config
Targets
-
-
Target
a7b300a4306b875f1b1da5a4e10748e2_JaffaCakes118
-
Size
5.4MB
-
MD5
a7b300a4306b875f1b1da5a4e10748e2
-
SHA1
86d9caa516bcd1c734e29a3d6ad001bb0173e261
-
SHA256
2a3109cf0607c79ad20893bbcc9ba6f4b59dcf50ff2f37d0a0c0b113e4329bd2
-
SHA512
9cb917fce83e75c4665affc7a1768186e5c3736a0f9cb6a4b6277665c5f95dc9697f738766faf48d0054a8b7fc5394c98aaa03044001a8ff32f5d646cc8a4f19
-
SSDEEP
98304:Qa8IG1em4SOUsALcOHAnGr7cc13PcJ4baPBhpZ0l4SODBzjXs66dRCiBiZX8SjvJ:QrH1T4SOdQmn8QEcJ4baVs4SOobBi184
Score8/10-
Checks if the Android device is rooted.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-