General
-
Target
b4503c974ee85db8a28045b1be712891_JaffaCakes118
-
Size
9.9MB
-
Sample
240616-s9mzjatbnj
-
MD5
b4503c974ee85db8a28045b1be712891
-
SHA1
3ef0c026f0e3f8055838ab7fa987180a8aad43f4
-
SHA256
30aae53266bc189c83321674a29e9d0ab9b971e82dfb035b97e580785404591f
-
SHA512
fbe933361a76cdc99b9845a7fb0c3cc1f5c136251274fa958fa68fe9317a48283356b7088de068fc220f9b3a42a29cda3b851ec4ab4e1e384ed7f8dfd15b1d7c
-
SSDEEP
196608:TRRz4L5vq8Iog8DYkSKMZsf5wLCcZRppdCn8pzUD+1RU8PKavUd5YoVi:TTULpotk2sfmmSbdKaYDoXNUTYoc
Static task
static1
Behavioral task
behavioral1
Sample
b4503c974ee85db8a28045b1be712891_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
Malware Config
Targets
-
-
Target
b4503c974ee85db8a28045b1be712891_JaffaCakes118
-
Size
9.9MB
-
MD5
b4503c974ee85db8a28045b1be712891
-
SHA1
3ef0c026f0e3f8055838ab7fa987180a8aad43f4
-
SHA256
30aae53266bc189c83321674a29e9d0ab9b971e82dfb035b97e580785404591f
-
SHA512
fbe933361a76cdc99b9845a7fb0c3cc1f5c136251274fa958fa68fe9317a48283356b7088de068fc220f9b3a42a29cda3b851ec4ab4e1e384ed7f8dfd15b1d7c
-
SSDEEP
196608:TRRz4L5vq8Iog8DYkSKMZsf5wLCcZRppdCn8pzUD+1RU8PKavUd5YoVi:TTULpotk2sfmmSbdKaYDoXNUTYoc
Score8/10-
Checks if the Android device is rooted.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-