General
-
Target
d7173c9babd973dd4260cc7efb85e449_JaffaCakes118
-
Size
30.2MB
-
Sample
240909-zw8gmssbqa
-
MD5
d7173c9babd973dd4260cc7efb85e449
-
SHA1
4deb564964978af6db1689174ff73247df42125f
-
SHA256
f1c48d8c9ddf6ae95352e31a4652fda20d4f48e11381ce9b19a30f8610e6f5a7
-
SHA512
ed8cc015ebdbf6a72eaed7abf94fa67454e9c02a478dc8c5a2a4570181b6c9bc7407acfd907232d6204ce9bd0535eeb6a16fa4014cd862f47cd052b3dc428e76
-
SSDEEP
786432:SVdQweQqLsEdxIC7CosqZPbV0evaN2y1M6GIZ1toXb:gpersuyC7CosoPbGhN2l691O
Static task
static1
Behavioral task
behavioral1
Sample
d7173c9babd973dd4260cc7efb85e449_JaffaCakes118.apk
Resource
android-x86-arm-20240910-en
Malware Config
Targets
-
-
Target
d7173c9babd973dd4260cc7efb85e449_JaffaCakes118
-
Size
30.2MB
-
MD5
d7173c9babd973dd4260cc7efb85e449
-
SHA1
4deb564964978af6db1689174ff73247df42125f
-
SHA256
f1c48d8c9ddf6ae95352e31a4652fda20d4f48e11381ce9b19a30f8610e6f5a7
-
SHA512
ed8cc015ebdbf6a72eaed7abf94fa67454e9c02a478dc8c5a2a4570181b6c9bc7407acfd907232d6204ce9bd0535eeb6a16fa4014cd862f47cd052b3dc428e76
-
SSDEEP
786432:SVdQweQqLsEdxIC7CosqZPbV0evaN2y1M6GIZ1toXb:gpersuyC7CosoPbGhN2l691O
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Reads information about phone network operator.
-