General
-
Target
16072e69efe5466e4f4537e2039c5960_JaffaCakes118
-
Size
378KB
-
Sample
241005-eaachaxglc
-
MD5
16072e69efe5466e4f4537e2039c5960
-
SHA1
75a2a392a4dbc9eecf679f74ab4cbcd0cbad75db
-
SHA256
55ee4235bbc07eabbce3dad2b950ca49f00e39be0fe430cd6a7ba1af72241754
-
SHA512
6e3b51d50b557952cf1b88f516ac2479b6023aeb518544a769fd638bc2d8d8e8a76fdfd3ac057d8630646fb6e45855c4455b7df8dbb3c68072b8250f804b727d
-
SSDEEP
6144:w1alIf9rFq9IknzA2NwoRmsT6uAto7YVoEcl2s+XdCcPBS:wElIrFZCpvT67y6oEcMjXdCc8
Static task
static1
Behavioral task
behavioral1
Sample
16072e69efe5466e4f4537e2039c5960_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
16072e69efe5466e4f4537e2039c5960_JaffaCakes118.apk
Resource
android-x64-20240624-en
Malware Config
Targets
-
-
Target
16072e69efe5466e4f4537e2039c5960_JaffaCakes118
-
Size
378KB
-
MD5
16072e69efe5466e4f4537e2039c5960
-
SHA1
75a2a392a4dbc9eecf679f74ab4cbcd0cbad75db
-
SHA256
55ee4235bbc07eabbce3dad2b950ca49f00e39be0fe430cd6a7ba1af72241754
-
SHA512
6e3b51d50b557952cf1b88f516ac2479b6023aeb518544a769fd638bc2d8d8e8a76fdfd3ac057d8630646fb6e45855c4455b7df8dbb3c68072b8250f804b727d
-
SSDEEP
6144:w1alIf9rFq9IknzA2NwoRmsT6uAto7YVoEcl2s+XdCcPBS:wElIrFZCpvT67y6oEcMjXdCc8
-
Checks if the Android device is rooted.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the unique device ID (IMEI, MEID, IMSI)
-