General
-
Target
ea834930c43a76d98efad6f8b053987f_JaffaCakes118
-
Size
30.2MB
-
Sample
240919-d6rqzsyhnp
-
MD5
ea834930c43a76d98efad6f8b053987f
-
SHA1
802aa3e9971bf16c2b8c979bc975aa450454808c
-
SHA256
93273d89cb6ee36db352fa95880564156dde39a69648beb3b9e01fd71d2aab88
-
SHA512
4eff371d175b0a37fadad423538c502ec9fdb8748d7024ca3479dd76cf54d8cdc919f6846f3d4de7e59018966e264962819c13a61bc7cd445ece60fab632ffb3
-
SSDEEP
786432:AgfB1xIC7T6NMImmdupZPAAsEY2MuvZAgo+/QvznjC:d1yC7T664uXPAAsR7uvSgonG
Static task
static1
Behavioral task
behavioral1
Sample
ea834930c43a76d98efad6f8b053987f_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Malware Config
Targets
-
-
Target
ea834930c43a76d98efad6f8b053987f_JaffaCakes118
-
Size
30.2MB
-
MD5
ea834930c43a76d98efad6f8b053987f
-
SHA1
802aa3e9971bf16c2b8c979bc975aa450454808c
-
SHA256
93273d89cb6ee36db352fa95880564156dde39a69648beb3b9e01fd71d2aab88
-
SHA512
4eff371d175b0a37fadad423538c502ec9fdb8748d7024ca3479dd76cf54d8cdc919f6846f3d4de7e59018966e264962819c13a61bc7cd445ece60fab632ffb3
-
SSDEEP
786432:AgfB1xIC7T6NMImmdupZPAAsEY2MuvZAgo+/QvznjC:d1yC7T664uXPAAsR7uvSgonG
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Reads information about phone network operator.
-