General
-
Target
c079b6b166be1a465fd4099bc2ad72cc_JaffaCakes118
-
Size
29.7MB
-
Sample
240825-ltl9qsxfpc
-
MD5
c079b6b166be1a465fd4099bc2ad72cc
-
SHA1
64f33271477acf3b04af2ec864437501a299ec04
-
SHA256
24336de93cd0981ff85793a27035650d778391f50bb5622140c35eceba9b4c8d
-
SHA512
0e94c90abc675824f28b76fc7fe599f2e2b0751b3571b916c791f33b8ee6a49d14d2a34f1a777f023681330c887866698031a3f59a5b66998bc766154152d941
-
SSDEEP
786432:ipuk+uieiE7212EXx1trQrA4c7cbBXoSBIYU9ug:0utuieb2QEB1trQlcMBIY0
Static task
static1
Behavioral task
behavioral1
Sample
c079b6b166be1a465fd4099bc2ad72cc_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Malware Config
Targets
-
-
Target
c079b6b166be1a465fd4099bc2ad72cc_JaffaCakes118
-
Size
29.7MB
-
MD5
c079b6b166be1a465fd4099bc2ad72cc
-
SHA1
64f33271477acf3b04af2ec864437501a299ec04
-
SHA256
24336de93cd0981ff85793a27035650d778391f50bb5622140c35eceba9b4c8d
-
SHA512
0e94c90abc675824f28b76fc7fe599f2e2b0751b3571b916c791f33b8ee6a49d14d2a34f1a777f023681330c887866698031a3f59a5b66998bc766154152d941
-
SSDEEP
786432:ipuk+uieiE7212EXx1trQrA4c7cbBXoSBIYU9ug:0utuieb2QEB1trQlcMBIY0
Score8/10-
Checks if the Android device is rooted.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-