General
-
Target
b2a3cf1dbb5698c208ee2c0a30e6058f_JaffaCakes118
-
Size
5.9MB
-
Sample
240821-jlcdfsxang
-
MD5
b2a3cf1dbb5698c208ee2c0a30e6058f
-
SHA1
dd9e9107c4aa9643b59253a17a1c8bd158d81e4c
-
SHA256
1c107ce354d880cb9466eb9018854277da2c79f88bd7592ae409939cb17c28e3
-
SHA512
f060edc69ecca4d62a282a99d187498895f324982c7e489fe09104b8759cbdc178a10211ff887e7000e2d8897007069b5c752ea3989ab800cc08221807483a07
-
SSDEEP
98304:3iK4Y/d/eeKSz/JTG2eRpEyoEc2c737hXwp3a+MGz6eCSWeOBHME8dzlYJKEYCWt:3+0pDJ/c2ovoR3xrUzTJO6qNYCvXKa5K
Static task
static1
Behavioral task
behavioral1
Sample
b2a3cf1dbb5698c208ee2c0a30e6058f_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Malware Config
Targets
-
-
Target
b2a3cf1dbb5698c208ee2c0a30e6058f_JaffaCakes118
-
Size
5.9MB
-
MD5
b2a3cf1dbb5698c208ee2c0a30e6058f
-
SHA1
dd9e9107c4aa9643b59253a17a1c8bd158d81e4c
-
SHA256
1c107ce354d880cb9466eb9018854277da2c79f88bd7592ae409939cb17c28e3
-
SHA512
f060edc69ecca4d62a282a99d187498895f324982c7e489fe09104b8759cbdc178a10211ff887e7000e2d8897007069b5c752ea3989ab800cc08221807483a07
-
SSDEEP
98304:3iK4Y/d/eeKSz/JTG2eRpEyoEc2c737hXwp3a+MGz6eCSWeOBHME8dzlYJKEYCWt:3+0pDJ/c2ovoR3xrUzTJO6qNYCvXKa5K
Score8/10-
Checks if the Android device is rooted.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-