General
-
Target
ada14a5e5609c7ab5dafd9d14b75edb4_JaffaCakes118
-
Size
30.1MB
-
Sample
240615-ktezzsyalk
-
MD5
ada14a5e5609c7ab5dafd9d14b75edb4
-
SHA1
389f4578f653db64145e902c8188c5b3bbd7f5dc
-
SHA256
a54d7ce55011577a1f7fd028d0a20de5170514a40cbe6c584fe6e7d0837da0b9
-
SHA512
2be98600d0e8069e3545ab8cfbc5aa68f000150042f14a44648ee122684ef2edaf1009e7713a5aa785fd3b8ca2bbc358222e7f4186cd9d2f8f2b6b96302cb45f
-
SSDEEP
786432:vOUkP1LIC7nG8Mc3Ah4JZPdxsE+ff7+pULECiQvmYeO:m18C7nGDL43PdxsLn7+KLEjM
Static task
static1
Behavioral task
behavioral1
Sample
ada14a5e5609c7ab5dafd9d14b75edb4_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
Malware Config
Targets
-
-
Target
ada14a5e5609c7ab5dafd9d14b75edb4_JaffaCakes118
-
Size
30.1MB
-
MD5
ada14a5e5609c7ab5dafd9d14b75edb4
-
SHA1
389f4578f653db64145e902c8188c5b3bbd7f5dc
-
SHA256
a54d7ce55011577a1f7fd028d0a20de5170514a40cbe6c584fe6e7d0837da0b9
-
SHA512
2be98600d0e8069e3545ab8cfbc5aa68f000150042f14a44648ee122684ef2edaf1009e7713a5aa785fd3b8ca2bbc358222e7f4186cd9d2f8f2b6b96302cb45f
-
SSDEEP
786432:vOUkP1LIC7nG8Mc3Ah4JZPdxsE+ff7+pULECiQvmYeO:m18C7nGDL43PdxsLn7+KLEjM
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Reads information about phone network operator.
-