General
-
Target
fc2b81f8eb283eefcf65698f4075216c_JaffaCakes118
-
Size
31.8MB
-
Sample
240928-m7qprasdnr
-
MD5
fc2b81f8eb283eefcf65698f4075216c
-
SHA1
54c21c07609e061b1db9a3605ab41975c201db17
-
SHA256
f80d2f4f1e6cc6428720bb27a003fe01d1162b27bdd0124c53817c1797b43c5d
-
SHA512
4b8f078df57dd8a219e64d95d389a00502d2ea16a2ce00629a4f4c275edc53f207aba2709fb345a2940916221062630c933649bb7a6311cd79aba275704673ff
-
SSDEEP
786432:vzZZ3cKvdVD+G3QlP5pqL8HFmzkvRLcyLgO4m6B1uhoLR0IxY2BN:rhv+G3QlxpqjzgLgG6BQh6RfxY2BN
Static task
static1
Behavioral task
behavioral1
Sample
fc2b81f8eb283eefcf65698f4075216c_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Malware Config
Targets
-
-
Target
fc2b81f8eb283eefcf65698f4075216c_JaffaCakes118
-
Size
31.8MB
-
MD5
fc2b81f8eb283eefcf65698f4075216c
-
SHA1
54c21c07609e061b1db9a3605ab41975c201db17
-
SHA256
f80d2f4f1e6cc6428720bb27a003fe01d1162b27bdd0124c53817c1797b43c5d
-
SHA512
4b8f078df57dd8a219e64d95d389a00502d2ea16a2ce00629a4f4c275edc53f207aba2709fb345a2940916221062630c933649bb7a6311cd79aba275704673ff
-
SSDEEP
786432:vzZZ3cKvdVD+G3QlP5pqL8HFmzkvRLcyLgO4m6B1uhoLR0IxY2BN:rhv+G3QlxpqjzgLgG6BQh6RfxY2BN
Score8/10-
Checks if the Android device is rooted.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-