General
-
Target
8610a811f39938f9d3c9a8b8eb544266_JaffaCakes118
-
Size
4.9MB
-
Sample
240810-pq7ytazalq
-
MD5
8610a811f39938f9d3c9a8b8eb544266
-
SHA1
74c82cdaa2ff35705fa930ad0334b63f18fbe795
-
SHA256
30d80502a00a67dd2428a13988253804370a86e294a35121233501b96c56abf3
-
SHA512
880ade7778d29039e790bfe1055d2961bd82277f752a2a5f1e0110f8b3e79300c669e1bc922fcdbb97ce1c1228a76abcd89d8e8c86f893fadd5112a3c48b7621
-
SSDEEP
98304:dpry0iAcceXsdxbx35K8TUW6hYWsjthPYkdSgSzD/0JPMskPPSJAdrs7bzFXyhyE:G0izc/Lbx3oYmhY/jbPxdSdUJ1kPaJAt
Static task
static1
Behavioral task
behavioral1
Sample
8610a811f39938f9d3c9a8b8eb544266_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Malware Config
Targets
-
-
Target
8610a811f39938f9d3c9a8b8eb544266_JaffaCakes118
-
Size
4.9MB
-
MD5
8610a811f39938f9d3c9a8b8eb544266
-
SHA1
74c82cdaa2ff35705fa930ad0334b63f18fbe795
-
SHA256
30d80502a00a67dd2428a13988253804370a86e294a35121233501b96c56abf3
-
SHA512
880ade7778d29039e790bfe1055d2961bd82277f752a2a5f1e0110f8b3e79300c669e1bc922fcdbb97ce1c1228a76abcd89d8e8c86f893fadd5112a3c48b7621
-
SSDEEP
98304:dpry0iAcceXsdxbx35K8TUW6hYWsjthPYkdSgSzD/0JPMskPPSJAdrs7bzFXyhyE:G0izc/Lbx3oYmhY/jbPxdSdUJ1kPaJAt
Score8/10-
Checks if the Android device is rooted.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-