General
-
Target
c271a09bda9c4338074bdd3dd7472d2f_JaffaCakes118
-
Size
8.8MB
-
Sample
240826-g35efs1cpl
-
MD5
c271a09bda9c4338074bdd3dd7472d2f
-
SHA1
378ec90265e3d382021c8e667bbd3667f7f01cd1
-
SHA256
ac4c60812da771db28d4e2cbcd1bb295753bcb54e32ba6982af27b7db9d5552b
-
SHA512
c0c5d3cb83b6872b249c1fccec41c28c64630eda82ce30ad6dd28bdd6a332554c77bcaa5e80488ff2ed7b0456527d8a335ddf2cbea8e8ab9c42c56a84b4c243d
-
SSDEEP
196608:1kaMBqy50B2TRu4atY0+DnMdfcwbM/nMkfSbSvti:1kbsy5G2THaEMeBfMxL
Static task
static1
Behavioral task
behavioral1
Sample
c271a09bda9c4338074bdd3dd7472d2f_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Malware Config
Targets
-
-
Target
c271a09bda9c4338074bdd3dd7472d2f_JaffaCakes118
-
Size
8.8MB
-
MD5
c271a09bda9c4338074bdd3dd7472d2f
-
SHA1
378ec90265e3d382021c8e667bbd3667f7f01cd1
-
SHA256
ac4c60812da771db28d4e2cbcd1bb295753bcb54e32ba6982af27b7db9d5552b
-
SHA512
c0c5d3cb83b6872b249c1fccec41c28c64630eda82ce30ad6dd28bdd6a332554c77bcaa5e80488ff2ed7b0456527d8a335ddf2cbea8e8ab9c42c56a84b4c243d
-
SSDEEP
196608:1kaMBqy50B2TRu4atY0+DnMdfcwbM/nMkfSbSvti:1kbsy5G2THaEMeBfMxL
Score8/10-
Checks if the Android device is rooted.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-