General
-
Target
b59f88d7ddf265693b43b486825ddd70_JaffaCakes118
-
Size
3.8MB
-
Sample
240616-2ydfdswfmk
-
MD5
b59f88d7ddf265693b43b486825ddd70
-
SHA1
417de4b89fa966106803dcd66505ed8bc1a158ea
-
SHA256
998a08e2b3ec687d37630742e3efa899efaa5541700d06969644a2a98c9dd499
-
SHA512
c62c0820e9f66787729479cee94309fbc4811192ef2aa4e390ecd43ffbef5d7cf59b1d9d42b5d895723f176e22251c2166aa645d7875a5971e6bfdb26ae076e0
-
SSDEEP
98304:P+cjxLDH5AqByjpX7McsFo9asvUs8e99y9V9hiRcQ2pyoW:P+cZDH5AOgUYasl8e/s3Tpy/
Behavioral task
behavioral1
Sample
b59f88d7ddf265693b43b486825ddd70_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
Malware Config
Targets
-
-
Target
b59f88d7ddf265693b43b486825ddd70_JaffaCakes118
-
Size
3.8MB
-
MD5
b59f88d7ddf265693b43b486825ddd70
-
SHA1
417de4b89fa966106803dcd66505ed8bc1a158ea
-
SHA256
998a08e2b3ec687d37630742e3efa899efaa5541700d06969644a2a98c9dd499
-
SHA512
c62c0820e9f66787729479cee94309fbc4811192ef2aa4e390ecd43ffbef5d7cf59b1d9d42b5d895723f176e22251c2166aa645d7875a5971e6bfdb26ae076e0
-
SSDEEP
98304:P+cjxLDH5AqByjpX7McsFo9asvUs8e99y9V9hiRcQ2pyoW:P+cZDH5AOgUYasl8e/s3Tpy/
-
Checks if the Android device is rooted.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the unique device ID (IMEI, MEID, IMSI)
-