General
-
Target
daf463305579a483f10f67fa65822955_JaffaCakes118
-
Size
30.4MB
-
Sample
240911-wym2yavfrj
-
MD5
daf463305579a483f10f67fa65822955
-
SHA1
57298d2ea0065e36fa6c739ffecc1ae0a8c57271
-
SHA256
1fa4747b5edad560b3ba2ca5b1bdee403f8acc300da60daafc4bb04085bf0712
-
SHA512
1ae9a55e6354494188f92da569dba2186cdc10edd47bac8e25b29f78c36eedc2789314d4c944b4c4eb8b92e9d0cc37d43ac9dfffb4af07cf7de5684c6fcf4212
-
SSDEEP
786432:QmAmW1zIC7zivM5lo1EaZPbJsEunWL28FQwirQfts8y:Q910C7zi0uE4PbJs7WL2oQwNu
Static task
static1
Behavioral task
behavioral1
Sample
daf463305579a483f10f67fa65822955_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Malware Config
Targets
-
-
Target
daf463305579a483f10f67fa65822955_JaffaCakes118
-
Size
30.4MB
-
MD5
daf463305579a483f10f67fa65822955
-
SHA1
57298d2ea0065e36fa6c739ffecc1ae0a8c57271
-
SHA256
1fa4747b5edad560b3ba2ca5b1bdee403f8acc300da60daafc4bb04085bf0712
-
SHA512
1ae9a55e6354494188f92da569dba2186cdc10edd47bac8e25b29f78c36eedc2789314d4c944b4c4eb8b92e9d0cc37d43ac9dfffb4af07cf7de5684c6fcf4212
-
SSDEEP
786432:QmAmW1zIC7zivM5lo1EaZPbJsEunWL28FQwirQfts8y:Q910C7zi0uE4PbJs7WL2oQwNu
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Reads information about phone network operator.
-