General
-
Target
dd363a17e193df2cc296730189ce006a_JaffaCakes118
-
Size
31.0MB
-
Sample
240912-245f3azgpq
-
MD5
dd363a17e193df2cc296730189ce006a
-
SHA1
9d4a4866a85b66cb79378f8c27bee9c324320d38
-
SHA256
03f87a00b9f5ba9d70adc3b5c5cb3f581f5bbdb5111cfefbae678cc3c3112fe8
-
SHA512
dd2ba2076db4ea11dc70c20fa41f4d3137d07c3b46515f6b8ec64fc278595e74b2edbf8acf0a6dc7866243155c499e011105407be1603253bd8913058935c8ba
-
SSDEEP
786432:lymeOEVJEaf0JvN7OHbljSeHyCPg51+oLHhtGxQbF1sv:EmeOOKvN7ittPgTfPGOF1C
Behavioral task
behavioral1
Sample
dd363a17e193df2cc296730189ce006a_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
dd363a17e193df2cc296730189ce006a_JaffaCakes118.apk
Resource
android-x64-20240624-en
Malware Config
Targets
-
-
Target
dd363a17e193df2cc296730189ce006a_JaffaCakes118
-
Size
31.0MB
-
MD5
dd363a17e193df2cc296730189ce006a
-
SHA1
9d4a4866a85b66cb79378f8c27bee9c324320d38
-
SHA256
03f87a00b9f5ba9d70adc3b5c5cb3f581f5bbdb5111cfefbae678cc3c3112fe8
-
SHA512
dd2ba2076db4ea11dc70c20fa41f4d3137d07c3b46515f6b8ec64fc278595e74b2edbf8acf0a6dc7866243155c499e011105407be1603253bd8913058935c8ba
-
SSDEEP
786432:lymeOEVJEaf0JvN7OHbljSeHyCPg51+oLHhtGxQbF1sv:EmeOOKvN7ittPgTfPGOF1C
Score8/10-
Checks if the Android device is rooted.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the unique device ID (IMEI, MEID, IMSI)
-