General
-
Target
ebb9333871a375107a7e4a1a5287278c_JaffaCakes118
-
Size
23.7MB
-
Sample
240919-tvha6sxhrd
-
MD5
ebb9333871a375107a7e4a1a5287278c
-
SHA1
59d8824b2fb07c3d1d4aa18ba9c7fedd4ea9393f
-
SHA256
db8ac968145f2a5298ca2482d5a494d5ecf6b756f06a82bbde5c64436d8744ee
-
SHA512
63fcafc26c6264826bfe7f13f63f1500af18500ae53236179182ef47480acc449629e50155d1101f9689266c20dc618d9fd2321a7b7ab9c8b638c244956b7793
-
SSDEEP
393216:AUiNMnloScQdy6m8dAVlbTS61ghaCIMaTfG2QThTrvqJD535OsSOWpUQa1MuI/TE:AUiNMnloScQdy5FP71IzwfGP9Ed34sSO
Static task
static1
Behavioral task
behavioral1
Sample
ebb9333871a375107a7e4a1a5287278c_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Malware Config
Targets
-
-
Target
ebb9333871a375107a7e4a1a5287278c_JaffaCakes118
-
Size
23.7MB
-
MD5
ebb9333871a375107a7e4a1a5287278c
-
SHA1
59d8824b2fb07c3d1d4aa18ba9c7fedd4ea9393f
-
SHA256
db8ac968145f2a5298ca2482d5a494d5ecf6b756f06a82bbde5c64436d8744ee
-
SHA512
63fcafc26c6264826bfe7f13f63f1500af18500ae53236179182ef47480acc449629e50155d1101f9689266c20dc618d9fd2321a7b7ab9c8b638c244956b7793
-
SSDEEP
393216:AUiNMnloScQdy6m8dAVlbTS61ghaCIMaTfG2QThTrvqJD535OsSOWpUQa1MuI/TE:AUiNMnloScQdy5FP71IzwfGP9Ed34sSO
Score8/10-
Checks if the Android device is rooted.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-