General
-
Target
81cae85eda4f7551fec7111e1b4e2144_JaffaCakes118
-
Size
10.5MB
-
Sample
240801-1cekws1dma
-
MD5
81cae85eda4f7551fec7111e1b4e2144
-
SHA1
65f2a27305c3c9da3e882af6139d5bc6725c83b2
-
SHA256
1aa44fcf5a2d988d0e100ae2c90cdcb10f117e6794fc514ef28fffc05652adb7
-
SHA512
aa55e92e11862f695a962c862c322a1ae998429ff55c497f07e451d9558ea6be68affbca7658c535e0157cdc8eb170daf72d514f9c629ff05cd2d154a63d00f7
-
SSDEEP
196608:QLEmFKJAI0nEl5I1u6rw2WPeneUxeJwedO/C4u7UCkM/maN+6L/706dR9tRGCkp4:QLDnEl5I1u6rZnd00C42/LT0sRiw
Static task
static1
Behavioral task
behavioral1
Sample
81cae85eda4f7551fec7111e1b4e2144_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
81cae85eda4f7551fec7111e1b4e2144_JaffaCakes118.apk
Resource
android-33-x64-arm64-20240624-en
Malware Config
Targets
-
-
Target
81cae85eda4f7551fec7111e1b4e2144_JaffaCakes118
-
Size
10.5MB
-
MD5
81cae85eda4f7551fec7111e1b4e2144
-
SHA1
65f2a27305c3c9da3e882af6139d5bc6725c83b2
-
SHA256
1aa44fcf5a2d988d0e100ae2c90cdcb10f117e6794fc514ef28fffc05652adb7
-
SHA512
aa55e92e11862f695a962c862c322a1ae998429ff55c497f07e451d9558ea6be68affbca7658c535e0157cdc8eb170daf72d514f9c629ff05cd2d154a63d00f7
-
SSDEEP
196608:QLEmFKJAI0nEl5I1u6rw2WPeneUxeJwedO/C4u7UCkM/maN+6L/706dR9tRGCkp4:QLDnEl5I1u6rZnd00C42/LT0sRiw
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-