General
-
Target
c88e2a0c539cbed539f99bf552d01ca0_JaffaCakes118
-
Size
4.0MB
-
Sample
240829-lc8fmstgng
-
MD5
c88e2a0c539cbed539f99bf552d01ca0
-
SHA1
cbcda4cfeb2eb628999173301306d3f24dda671f
-
SHA256
4e5a7fef3af4f7b0f16da962e58b57867775ea62acb4bd78d6cd2cdcbc2f1d83
-
SHA512
b369212777e33051518d282f3437bf07c42ed2e2171e49ee574cedd77e7106ff18765c841d194fa97daa47aa744725f47abb14481732d7fe5f0caa1f069e0a57
-
SSDEEP
98304:gq7kME/n/J+chECkCLkVDWWEVvNFZesifY5dXC0aHr0:gq+//XkCLZpLtUcdXC0aI
Static task
static1
Behavioral task
behavioral1
Sample
c88e2a0c539cbed539f99bf552d01ca0_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Malware Config
Targets
-
-
Target
c88e2a0c539cbed539f99bf552d01ca0_JaffaCakes118
-
Size
4.0MB
-
MD5
c88e2a0c539cbed539f99bf552d01ca0
-
SHA1
cbcda4cfeb2eb628999173301306d3f24dda671f
-
SHA256
4e5a7fef3af4f7b0f16da962e58b57867775ea62acb4bd78d6cd2cdcbc2f1d83
-
SHA512
b369212777e33051518d282f3437bf07c42ed2e2171e49ee574cedd77e7106ff18765c841d194fa97daa47aa744725f47abb14481732d7fe5f0caa1f069e0a57
-
SSDEEP
98304:gq7kME/n/J+chECkCLkVDWWEVvNFZesifY5dXC0aHr0:gq+//XkCLZpLtUcdXC0aI
Score8/10-
Checks if the Android device is rooted.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-