General
-
Target
ff9bbfb77037ef588ed92c91a9272eda_JaffaCakes118
-
Size
13.2MB
-
Sample
240930-a45y2sshpa
-
MD5
ff9bbfb77037ef588ed92c91a9272eda
-
SHA1
55ce11377520fdf367c199c27b49eebb4b34857c
-
SHA256
47e8203254fc6d7a562ef8fadd0055a020ad8c8e139166a95d6aa7721fb90806
-
SHA512
1a6adca1cab1b7efc1a4969284de794529edb302b2844bdb908ce38d589eca72b1db2c99c077dc1ce9358556bc24f8088a9c4ac59ff87d828128b5c1d04d3c88
-
SSDEEP
196608:+ujM0DJzcBTS3/eUpNt4sriXxcwtYw7svo1SU/7BzTXjK+vkjiUeSpxUXRI90aYq:+uncZw/LpjiXeIYwT1Z/2YPOn
Static task
static1
Behavioral task
behavioral1
Sample
ff9bbfb77037ef588ed92c91a9272eda_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Malware Config
Targets
-
-
Target
ff9bbfb77037ef588ed92c91a9272eda_JaffaCakes118
-
Size
13.2MB
-
MD5
ff9bbfb77037ef588ed92c91a9272eda
-
SHA1
55ce11377520fdf367c199c27b49eebb4b34857c
-
SHA256
47e8203254fc6d7a562ef8fadd0055a020ad8c8e139166a95d6aa7721fb90806
-
SHA512
1a6adca1cab1b7efc1a4969284de794529edb302b2844bdb908ce38d589eca72b1db2c99c077dc1ce9358556bc24f8088a9c4ac59ff87d828128b5c1d04d3c88
-
SSDEEP
196608:+ujM0DJzcBTS3/eUpNt4sriXxcwtYw7svo1SU/7BzTXjK+vkjiUeSpxUXRI90aYq:+uncZw/LpjiXeIYwT1Z/2YPOn
Score8/10-
Checks if the Android device is rooted.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-