General
-
Target
e0862abc2b831631b4410a936489efe3_JaffaCakes118
-
Size
9.1MB
-
Sample
240914-td7jqssfnb
-
MD5
e0862abc2b831631b4410a936489efe3
-
SHA1
53f93c23865da235863e2714140154149181f7ad
-
SHA256
09136b0ca18c8d4853e8801a3091d7055d22e2d87db0c58d51da0f10aa2a72b9
-
SHA512
bec7fcf8368b5073f632263a77bc7942732aa016299f7a81aac1c19dc15eb5c04df983faf5acd181e3357355e4ceeed80eeb2cfbc541f6fcd57b25f159ec2eb8
-
SSDEEP
196608:ZaG2jvX2etAWIsxBj2xxxQLAd2RkCvMOkDGxJxbxIxHxYxExXxZx6x3o7q:xe2e2WI+SnQEkRkCvMEP9yRCmhfw3P
Static task
static1
Behavioral task
behavioral1
Sample
e0862abc2b831631b4410a936489efe3_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Malware Config
Targets
-
-
Target
e0862abc2b831631b4410a936489efe3_JaffaCakes118
-
Size
9.1MB
-
MD5
e0862abc2b831631b4410a936489efe3
-
SHA1
53f93c23865da235863e2714140154149181f7ad
-
SHA256
09136b0ca18c8d4853e8801a3091d7055d22e2d87db0c58d51da0f10aa2a72b9
-
SHA512
bec7fcf8368b5073f632263a77bc7942732aa016299f7a81aac1c19dc15eb5c04df983faf5acd181e3357355e4ceeed80eeb2cfbc541f6fcd57b25f159ec2eb8
-
SSDEEP
196608:ZaG2jvX2etAWIsxBj2xxxQLAd2RkCvMOkDGxJxbxIxHxYxExXxZx6x3o7q:xe2e2WI+SnQEkRkCvMEP9yRCmhfw3P
Score8/10-
Checks if the Android device is rooted.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-