General
-
Target
c7a45a4338b1684d56c484c109ee3a91_JaffaCakes118
-
Size
28.3MB
-
Sample
240828-zs186awbng
-
MD5
c7a45a4338b1684d56c484c109ee3a91
-
SHA1
419486ed595c6277887331e3364814c4ae195b4b
-
SHA256
8abe3611ae5f25bbc5ada12b4374605975f1cbba9b9c6a29aa3d247c882141d0
-
SHA512
fbb6a0f9cd338daaa1273b5eb861da27ef6c364a7fa8a8a79dc958a39d92b154e7bbf4508aef40a4bddb6a43cdcefff8cb8a345b176928f07cec96b1f104fbcf
-
SSDEEP
786432:4d9MDlg3lYA57FTtB66eH1dBuniXZ/W+YSy3lwJhu:4Ig3ZTB9eHPn/WFb3lwq
Static task
static1
Behavioral task
behavioral1
Sample
c7a45a4338b1684d56c484c109ee3a91_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Malware Config
Targets
-
-
Target
c7a45a4338b1684d56c484c109ee3a91_JaffaCakes118
-
Size
28.3MB
-
MD5
c7a45a4338b1684d56c484c109ee3a91
-
SHA1
419486ed595c6277887331e3364814c4ae195b4b
-
SHA256
8abe3611ae5f25bbc5ada12b4374605975f1cbba9b9c6a29aa3d247c882141d0
-
SHA512
fbb6a0f9cd338daaa1273b5eb861da27ef6c364a7fa8a8a79dc958a39d92b154e7bbf4508aef40a4bddb6a43cdcefff8cb8a345b176928f07cec96b1f104fbcf
-
SSDEEP
786432:4d9MDlg3lYA57FTtB66eH1dBuniXZ/W+YSy3lwJhu:4Ig3ZTB9eHPn/WFb3lwq
Score8/10-
Checks if the Android device is rooted.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-