General
-
Target
a7ccf98ab30ee4c14ef726389a5e7ee9_JaffaCakes118
-
Size
20.3MB
-
Sample
240614-dmtq8sshqa
-
MD5
a7ccf98ab30ee4c14ef726389a5e7ee9
-
SHA1
7cacf5d014126bc4d21201faa2bffe18829443f3
-
SHA256
e834998ef2aec8715419073c4d6d350954c8d7bf5ad1110e57d273edb3a57bb9
-
SHA512
031866bf49ec1c3acd850ef0701dafe1acfb854133670932e5b1ff1c5fb85f8ce4be359d3e8cec353f879dfcd790ea1e41898fceb4088e3e62019d5656aa64c3
-
SSDEEP
393216:iQAqlTBDqIrYLTs1T6Gk8+hE5zEqSPDZTL3IQ/pr5ILAFL6OxCUQCETpRL9zHkfx:i3kB+IrYn26GkUzEP1/YQ/lRLbsZnpzg
Static task
static1
Behavioral task
behavioral1
Sample
a7ccf98ab30ee4c14ef726389a5e7ee9_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
Malware Config
Targets
-
-
Target
a7ccf98ab30ee4c14ef726389a5e7ee9_JaffaCakes118
-
Size
20.3MB
-
MD5
a7ccf98ab30ee4c14ef726389a5e7ee9
-
SHA1
7cacf5d014126bc4d21201faa2bffe18829443f3
-
SHA256
e834998ef2aec8715419073c4d6d350954c8d7bf5ad1110e57d273edb3a57bb9
-
SHA512
031866bf49ec1c3acd850ef0701dafe1acfb854133670932e5b1ff1c5fb85f8ce4be359d3e8cec353f879dfcd790ea1e41898fceb4088e3e62019d5656aa64c3
-
SSDEEP
393216:iQAqlTBDqIrYLTs1T6Gk8+hE5zEqSPDZTL3IQ/pr5ILAFL6OxCUQCETpRL9zHkfx:i3kB+IrYn26GkUzEP1/YQ/lRLbsZnpzg
Score8/10-
Checks if the Android device is rooted.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-