General
-
Target
b5698581361b5d6e0e79fe7403768d5e_JaffaCakes118
-
Size
30.2MB
-
Sample
240616-1zzjkszfqg
-
MD5
b5698581361b5d6e0e79fe7403768d5e
-
SHA1
1709ee5b5905b22469d97f8e2e1642d998c5c998
-
SHA256
5d65d27b16502dafa4701cefe186d962642cc41cfdeb0f6e009f4985d3dc5d38
-
SHA512
34e91e944098a94622bee9a96f4fa1403717cd3959a7daf5705858b1422de21ea7876a61da528bc9e3a37f050220825c99157579c535bfa34c288b8fee93aa6d
-
SSDEEP
786432:mv84H1GIC7jSHMt9Q9s7ZPjBsE+zW3SC1SUeVQbuJBW:m51tC7jSsisNPjBsDK3S6SUke
Static task
static1
Behavioral task
behavioral1
Sample
b5698581361b5d6e0e79fe7403768d5e_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
Malware Config
Targets
-
-
Target
b5698581361b5d6e0e79fe7403768d5e_JaffaCakes118
-
Size
30.2MB
-
MD5
b5698581361b5d6e0e79fe7403768d5e
-
SHA1
1709ee5b5905b22469d97f8e2e1642d998c5c998
-
SHA256
5d65d27b16502dafa4701cefe186d962642cc41cfdeb0f6e009f4985d3dc5d38
-
SHA512
34e91e944098a94622bee9a96f4fa1403717cd3959a7daf5705858b1422de21ea7876a61da528bc9e3a37f050220825c99157579c535bfa34c288b8fee93aa6d
-
SSDEEP
786432:mv84H1GIC7jSHMt9Q9s7ZPjBsE+zW3SC1SUeVQbuJBW:m51tC7jSsisNPjBsDK3S6SUke
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Reads information about phone network operator.
-