General
-
Target
b49210bc8de3ac1f869a4ef9afaa4c4e_JaffaCakes118
-
Size
4.1MB
-
Sample
240616-w4tfxasapf
-
MD5
b49210bc8de3ac1f869a4ef9afaa4c4e
-
SHA1
4cf47b6991a8d85d17b09c3cbc2cc20c0abec9ef
-
SHA256
129d713dacc3e022af75be408f5d5b04716b82e9900a1775145f8b232480fd79
-
SHA512
2966c5c90c70c0cdb5e4ab4fc0a997c6959250b47256a587d549a2e5be121f9293f43198ed0f6cea5dc7dd72401da3d6b3be239334edca3e4ccd18be0d7c5977
-
SSDEEP
98304:y47XfXmLs4OvdFSzAzAFvjUrKg4/KsIQr5nIXN7Zs84enU3lxpbqFKBB:v7/SQvdokzejUrKg4/Ki9nIXffu3hqFq
Static task
static1
Behavioral task
behavioral1
Sample
b49210bc8de3ac1f869a4ef9afaa4c4e_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
Malware Config
Targets
-
-
Target
b49210bc8de3ac1f869a4ef9afaa4c4e_JaffaCakes118
-
Size
4.1MB
-
MD5
b49210bc8de3ac1f869a4ef9afaa4c4e
-
SHA1
4cf47b6991a8d85d17b09c3cbc2cc20c0abec9ef
-
SHA256
129d713dacc3e022af75be408f5d5b04716b82e9900a1775145f8b232480fd79
-
SHA512
2966c5c90c70c0cdb5e4ab4fc0a997c6959250b47256a587d549a2e5be121f9293f43198ed0f6cea5dc7dd72401da3d6b3be239334edca3e4ccd18be0d7c5977
-
SSDEEP
98304:y47XfXmLs4OvdFSzAzAFvjUrKg4/KsIQr5nIXN7Zs84enU3lxpbqFKBB:v7/SQvdokzejUrKg4/Ki9nIXffu3hqFq
Score8/10-
Checks if the Android device is rooted.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-