General
-
Target
255227789677175eac149c19fb0b17ca_JaffaCakes118
-
Size
7.2MB
-
Sample
241008-zqjakavhrp
-
MD5
255227789677175eac149c19fb0b17ca
-
SHA1
85e6d876c01fa58d0eafd4831706fb6c60f5f0e7
-
SHA256
17268cb4955620a90512b5d980063620e82f9a715cabe2557dc1b2b062d4ea77
-
SHA512
c202842199d1590e508e425a2300859a0ad56a75ebb86834b1e0533cfc08661338fd29383c20b9dcde6152a27d2cdc4e28adb21c4f11bb4f0eb3d05bf992ebbc
-
SSDEEP
196608:/4mBmFXSUkYvz6wIj3WJEdGLpoi9K25l9a49cm7/H8yTh3pL:/XUkYvz6kuG9nHadm7kQBpL
Static task
static1
Behavioral task
behavioral1
Sample
255227789677175eac149c19fb0b17ca_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Malware Config
Targets
-
-
Target
255227789677175eac149c19fb0b17ca_JaffaCakes118
-
Size
7.2MB
-
MD5
255227789677175eac149c19fb0b17ca
-
SHA1
85e6d876c01fa58d0eafd4831706fb6c60f5f0e7
-
SHA256
17268cb4955620a90512b5d980063620e82f9a715cabe2557dc1b2b062d4ea77
-
SHA512
c202842199d1590e508e425a2300859a0ad56a75ebb86834b1e0533cfc08661338fd29383c20b9dcde6152a27d2cdc4e28adb21c4f11bb4f0eb3d05bf992ebbc
-
SSDEEP
196608:/4mBmFXSUkYvz6wIj3WJEdGLpoi9K25l9a49cm7/H8yTh3pL:/XUkYvz6kuG9nHadm7kQBpL
Score8/10-
Checks if the Android device is rooted.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-