General
-
Target
aaed79c25b704d39d29a4b622e0e9800_JaffaCakes118
-
Size
11.4MB
-
Sample
240614-v4nd8atenq
-
MD5
aaed79c25b704d39d29a4b622e0e9800
-
SHA1
1b15db19332d6cc281198ca55da77270fd89e1c3
-
SHA256
4c108dc8ae8e02719e1d0844ae77d820fd91cb97c48cac5363a069aa3249d192
-
SHA512
57984a9acbbd427c1e90dc2613093236ab09e9397a79aa910d5b84d9e052df2f4a2852312c60e4c728b4b6628349c1c53d0ccb9dd56e0826e63f15994604db8c
-
SSDEEP
196608:qV27+Ps5frJ+XF7C+5YcomPctss9MuEyARMQwkYIPeaosbYAEPkCXjPIo2:q65fr817V8m0kuENMQwkfbYAMkCXjPIn
Static task
static1
Behavioral task
behavioral1
Sample
aaed79c25b704d39d29a4b622e0e9800_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
Malware Config
Targets
-
-
Target
aaed79c25b704d39d29a4b622e0e9800_JaffaCakes118
-
Size
11.4MB
-
MD5
aaed79c25b704d39d29a4b622e0e9800
-
SHA1
1b15db19332d6cc281198ca55da77270fd89e1c3
-
SHA256
4c108dc8ae8e02719e1d0844ae77d820fd91cb97c48cac5363a069aa3249d192
-
SHA512
57984a9acbbd427c1e90dc2613093236ab09e9397a79aa910d5b84d9e052df2f4a2852312c60e4c728b4b6628349c1c53d0ccb9dd56e0826e63f15994604db8c
-
SSDEEP
196608:qV27+Ps5frJ+XF7C+5YcomPctss9MuEyARMQwkYIPeaosbYAEPkCXjPIo2:q65fr817V8m0kuENMQwkfbYAMkCXjPIn
Score8/10-
Checks if the Android device is rooted.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-