General
-
Target
f674676d94e81489d4373744eb7d3be6_JaffaCakes118
-
Size
13.1MB
-
Sample
240925-vgzhzazcjg
-
MD5
f674676d94e81489d4373744eb7d3be6
-
SHA1
9d131f62a5ca7e706dc2302397a797939deb05b0
-
SHA256
fde7b7509097cf57cb013682f9e2864c3bc34e9bd4b455892dbe12619602f471
-
SHA512
5fffb1aac021e57e17aeb6b4e909681cc392aa19c48f5b8e6f70286de31a59c73935e2e18674f27ea67f349318fee8f5cf1065c58b124b2cdea737cedfe5a384
-
SSDEEP
393216:aULDX9Msr+JvZYM5cJvZYM0DDrQmFoV3pR1ImYuZVd:aU39MsroxYM5qxYM0DDcmCJf1I0P
Static task
static1
Behavioral task
behavioral1
Sample
f674676d94e81489d4373744eb7d3be6_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Malware Config
Targets
-
-
Target
f674676d94e81489d4373744eb7d3be6_JaffaCakes118
-
Size
13.1MB
-
MD5
f674676d94e81489d4373744eb7d3be6
-
SHA1
9d131f62a5ca7e706dc2302397a797939deb05b0
-
SHA256
fde7b7509097cf57cb013682f9e2864c3bc34e9bd4b455892dbe12619602f471
-
SHA512
5fffb1aac021e57e17aeb6b4e909681cc392aa19c48f5b8e6f70286de31a59c73935e2e18674f27ea67f349318fee8f5cf1065c58b124b2cdea737cedfe5a384
-
SSDEEP
393216:aULDX9Msr+JvZYM5cJvZYM0DDrQmFoV3pR1ImYuZVd:aU39MsroxYM5qxYM0DDcmCJf1I0P
Score8/10-
Checks if the Android device is rooted.
-
Queries information about active data network
-