General
-
Target
ea86c7f3bd6d4d9c878bf848a09cfd85_JaffaCakes118
-
Size
5.4MB
-
Sample
240919-ebsv8szakf
-
MD5
ea86c7f3bd6d4d9c878bf848a09cfd85
-
SHA1
d4ad4a39c7faf352c150793ca3c4b9fa3d8ae592
-
SHA256
e6408161a5c7f5c3eefa7d73816ba919f4343088242bcc4a5805f8be5d3754c7
-
SHA512
68c69ce361b69a1865566ca715cb368f1addc88a718423d4ad7524301081b69599d5d7d15a8c0b1bfa1002c8915647d3c6de85bef4a43ced63cdae2dd807a783
-
SSDEEP
98304:/AX0qKeSA8xqWs8c6zU4xKJVoBsF/o3xjv6/ZrPWpBoNSy03V63ycUPJWImtAY:/FqKjA88WXrKVfF/ohjv0PkL3V63gJTK
Static task
static1
Behavioral task
behavioral1
Sample
ea86c7f3bd6d4d9c878bf848a09cfd85_JaffaCakes118.apk
Resource
android-x86-arm-20240910-en
Malware Config
Targets
-
-
Target
ea86c7f3bd6d4d9c878bf848a09cfd85_JaffaCakes118
-
Size
5.4MB
-
MD5
ea86c7f3bd6d4d9c878bf848a09cfd85
-
SHA1
d4ad4a39c7faf352c150793ca3c4b9fa3d8ae592
-
SHA256
e6408161a5c7f5c3eefa7d73816ba919f4343088242bcc4a5805f8be5d3754c7
-
SHA512
68c69ce361b69a1865566ca715cb368f1addc88a718423d4ad7524301081b69599d5d7d15a8c0b1bfa1002c8915647d3c6de85bef4a43ced63cdae2dd807a783
-
SSDEEP
98304:/AX0qKeSA8xqWs8c6zU4xKJVoBsF/o3xjv6/ZrPWpBoNSy03V63ycUPJWImtAY:/FqKjA88WXrKVfF/ohjv0PkL3V63gJTK
Score8/10-
Checks if the Android device is rooted.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-