General
-
Target
a960e9d791051d38b60b04fb143b9075_JaffaCakes118
-
Size
20.1MB
-
Sample
240614-nbp9saybja
-
MD5
a960e9d791051d38b60b04fb143b9075
-
SHA1
bc815210bd27e1e167cd03d755449faed62ec333
-
SHA256
cf3ac6bcae8a05d9b661c6b22cb256d0f82e15201d31fe2ca67010eb72cb0481
-
SHA512
840f41d278947f83534264c6d14e2d9ab3c34c53c7eeb84880c01569334e01f9f9334ded77581c94f87a690458e7ed0d7300c180d0adb509a0aac35d80430f49
-
SSDEEP
393216:KrTVm5CN4qHX8Y8gLivPNJamkmmNGJvKoCaZfnM5i0Ee88An1gGt4PwlrEo:KlFjMY8ZnOj2K+H0EO81VmIF1
Static task
static1
Behavioral task
behavioral1
Sample
a960e9d791051d38b60b04fb143b9075_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
Behavioral task
behavioral2
Sample
a960e9d791051d38b60b04fb143b9075_JaffaCakes118.apk
Resource
android-x64-20240611.1-en
Malware Config
Targets
-
-
Target
a960e9d791051d38b60b04fb143b9075_JaffaCakes118
-
Size
20.1MB
-
MD5
a960e9d791051d38b60b04fb143b9075
-
SHA1
bc815210bd27e1e167cd03d755449faed62ec333
-
SHA256
cf3ac6bcae8a05d9b661c6b22cb256d0f82e15201d31fe2ca67010eb72cb0481
-
SHA512
840f41d278947f83534264c6d14e2d9ab3c34c53c7eeb84880c01569334e01f9f9334ded77581c94f87a690458e7ed0d7300c180d0adb509a0aac35d80430f49
-
SSDEEP
393216:KrTVm5CN4qHX8Y8gLivPNJamkmmNGJvKoCaZfnM5i0Ee88An1gGt4PwlrEo:KlFjMY8ZnOj2K+H0EO81VmIF1
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-