General
-
Target
dd0db0ce75403252027a639ae598b680_JaffaCakes118
-
Size
11.1MB
-
Sample
240912-zyvcssvcrj
-
MD5
dd0db0ce75403252027a639ae598b680
-
SHA1
b2575a4207f4a7136e4dfa6a7240034c7e691a31
-
SHA256
c269aa40a08fca6cb7ce037019a96c286dfa0bd681171c31dd5e9334b2a74cdc
-
SHA512
f3f8b821e71d4b44b63da9c0e520f9730c45c663165b55394a8ad57c450afeee72a145e92e8c3ba4ce914526cf6aaf1a6c3a18546c999672bc8a7465182092d5
-
SSDEEP
196608:PHuX8PDhocnSUbRsKdz7hdz7nKDnDy8JEHGhIJEHGhMywk4SOnQmn8QEcJ3ba56w:vuXyFEQjzP8JWnJWnrfyXrMH4
Static task
static1
Behavioral task
behavioral1
Sample
dd0db0ce75403252027a639ae598b680_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Malware Config
Targets
-
-
Target
dd0db0ce75403252027a639ae598b680_JaffaCakes118
-
Size
11.1MB
-
MD5
dd0db0ce75403252027a639ae598b680
-
SHA1
b2575a4207f4a7136e4dfa6a7240034c7e691a31
-
SHA256
c269aa40a08fca6cb7ce037019a96c286dfa0bd681171c31dd5e9334b2a74cdc
-
SHA512
f3f8b821e71d4b44b63da9c0e520f9730c45c663165b55394a8ad57c450afeee72a145e92e8c3ba4ce914526cf6aaf1a6c3a18546c999672bc8a7465182092d5
-
SSDEEP
196608:PHuX8PDhocnSUbRsKdz7hdz7nKDnDy8JEHGhIJEHGhMywk4SOnQmn8QEcJ3ba56w:vuXyFEQjzP8JWnJWnrfyXrMH4
Score8/10-
Checks if the Android device is rooted.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-