General
-
Target
e9d0a4e0f688aa575699b623c9cb655c_JaffaCakes118
-
Size
16.0MB
-
Sample
240918-x272ysyena
-
MD5
e9d0a4e0f688aa575699b623c9cb655c
-
SHA1
f4be88da5b2dfb0e5f81ee040dd18275e50d32e3
-
SHA256
9c4fda293acbd460608ce4f46d75be94a008f44b21f2f47097cc411f905a9410
-
SHA512
0577701dcbc6ab093249a6da8522543e883bbd9195af2a0e88ce9a448d5dce40a570615129ddff4ce97b39bb9b511c10a99e7932b031ca68f20c9aab5fa8cbb5
-
SSDEEP
393216:8KmqaLPoP/2GMWfRBfmut2xK6i+cNUWQI12:8OajoPXauwtieu12
Behavioral task
behavioral1
Sample
e9d0a4e0f688aa575699b623c9cb655c_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Malware Config
Targets
-
-
Target
e9d0a4e0f688aa575699b623c9cb655c_JaffaCakes118
-
Size
16.0MB
-
MD5
e9d0a4e0f688aa575699b623c9cb655c
-
SHA1
f4be88da5b2dfb0e5f81ee040dd18275e50d32e3
-
SHA256
9c4fda293acbd460608ce4f46d75be94a008f44b21f2f47097cc411f905a9410
-
SHA512
0577701dcbc6ab093249a6da8522543e883bbd9195af2a0e88ce9a448d5dce40a570615129ddff4ce97b39bb9b511c10a99e7932b031ca68f20c9aab5fa8cbb5
-
SSDEEP
393216:8KmqaLPoP/2GMWfRBfmut2xK6i+cNUWQI12:8OajoPXauwtieu12
Score8/10-
Checks if the Android device is rooted.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-