General
-
Target
8daa50ed9a482ce7aab5feb2a9509282_JaffaCakes118
-
Size
19.1MB
-
Sample
240812-g8h4eayfrm
-
MD5
8daa50ed9a482ce7aab5feb2a9509282
-
SHA1
faf46bbbd3527068f5e2ef26e0485d973c1df930
-
SHA256
a5b93c7aa7e717d1ee70ed73dec333f8d8b20364a852d6d5751ebda1d9fe12e7
-
SHA512
48b537f40101877ccf262c59a19b03689456f3fe3b65f5c470fef5e1d137d75fadde01f35798832fa0abc070b65f7ae7c3067f4482c97fa16a04853db5119474
-
SSDEEP
393216:f/P2uTZeGBeS1Z5mbxjK9Wjj8fnN6y/Ar3xoPXPtCBbCYCZNGo0bywsf7u7ic7Aq:P2uTZvLxlWjjsnN9YTsaKNt0Ef7uOMAq
Behavioral task
behavioral1
Sample
8daa50ed9a482ce7aab5feb2a9509282_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Malware Config
Targets
-
-
Target
8daa50ed9a482ce7aab5feb2a9509282_JaffaCakes118
-
Size
19.1MB
-
MD5
8daa50ed9a482ce7aab5feb2a9509282
-
SHA1
faf46bbbd3527068f5e2ef26e0485d973c1df930
-
SHA256
a5b93c7aa7e717d1ee70ed73dec333f8d8b20364a852d6d5751ebda1d9fe12e7
-
SHA512
48b537f40101877ccf262c59a19b03689456f3fe3b65f5c470fef5e1d137d75fadde01f35798832fa0abc070b65f7ae7c3067f4482c97fa16a04853db5119474
-
SSDEEP
393216:f/P2uTZeGBeS1Z5mbxjK9Wjj8fnN6y/Ar3xoPXPtCBbCYCZNGo0bywsf7u7ic7Aq:P2uTZvLxlWjjsnN9YTsaKNt0Ef7uOMAq
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current nearby Wi-Fi networks
Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-