General
-
Target
6322a7071af508402d8af2328fa9dc39_JaffaCakes118
-
Size
7.8MB
-
Sample
240722-n3rxpaxclm
-
MD5
6322a7071af508402d8af2328fa9dc39
-
SHA1
d8d13834e9e80af844cab24ec6b9999d79b9c24b
-
SHA256
e43b95c83fcd25044bd61f2db80ad710163b8b47485b9dc8dd04eddeb0c51b34
-
SHA512
0219adda9d8edf2de44086b8e951969d8a3bddd06a609f2fc24640bdd419a1d5a9eb66b4479d4a33e660feda1726b644fb2e32f178f3cba2bd0d5434bd199c81
-
SSDEEP
196608:K9mQ/zT19SXhAgAJWCowpdQ5lkiZ4kGsJyGjY02IEjhj+lE:3QrBsxwJ8wpdQ5lkyfJyGkjhH
Static task
static1
Behavioral task
behavioral1
Sample
6322a7071af508402d8af2328fa9dc39_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Malware Config
Targets
-
-
Target
6322a7071af508402d8af2328fa9dc39_JaffaCakes118
-
Size
7.8MB
-
MD5
6322a7071af508402d8af2328fa9dc39
-
SHA1
d8d13834e9e80af844cab24ec6b9999d79b9c24b
-
SHA256
e43b95c83fcd25044bd61f2db80ad710163b8b47485b9dc8dd04eddeb0c51b34
-
SHA512
0219adda9d8edf2de44086b8e951969d8a3bddd06a609f2fc24640bdd419a1d5a9eb66b4479d4a33e660feda1726b644fb2e32f178f3cba2bd0d5434bd199c81
-
SSDEEP
196608:K9mQ/zT19SXhAgAJWCowpdQ5lkiZ4kGsJyGjY02IEjhj+lE:3QrBsxwJ8wpdQ5lkyfJyGkjhH
Score8/10-
Checks if the Android device is rooted.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-