General
-
Target
b02f41ebe7a74804daa0effc54e72f9b_JaffaCakes118
-
Size
30.3MB
-
Sample
240615-1cx28svfkf
-
MD5
b02f41ebe7a74804daa0effc54e72f9b
-
SHA1
6e503bfdd3487d9f684564fd17dadee6e47276bd
-
SHA256
80c2187fd6d57705f3f13ca3c594e19e721c162a0e580cc262509ce38ca40b12
-
SHA512
c22c4ba7aa68ce4e3e1058ce9e7ac1a61f39722b3365fbd1766017b74ed199466b01da8df060d4650829ac93f18c288d65c5a3c05c02c2072755d75b2a37e9e0
-
SSDEEP
786432:eEAk1RIC7HeFMPrYZAX4abnsEA6i6nCx8AS3QXvznQ:11SC7HeS2AX4abnshJ6ny8A78
Static task
static1
Behavioral task
behavioral1
Sample
b02f41ebe7a74804daa0effc54e72f9b_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
Malware Config
Targets
-
-
Target
b02f41ebe7a74804daa0effc54e72f9b_JaffaCakes118
-
Size
30.3MB
-
MD5
b02f41ebe7a74804daa0effc54e72f9b
-
SHA1
6e503bfdd3487d9f684564fd17dadee6e47276bd
-
SHA256
80c2187fd6d57705f3f13ca3c594e19e721c162a0e580cc262509ce38ca40b12
-
SHA512
c22c4ba7aa68ce4e3e1058ce9e7ac1a61f39722b3365fbd1766017b74ed199466b01da8df060d4650829ac93f18c288d65c5a3c05c02c2072755d75b2a37e9e0
-
SSDEEP
786432:eEAk1RIC7HeFMPrYZAX4abnsEA6i6nCx8AS3QXvznQ:11SC7HeS2AX4abnshJ6ny8A78
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Reads information about phone network operator.
-