General
-
Target
4a2c1c9208c5d223319851fd1149fcd5_JaffaCakes118
-
Size
8.5MB
-
Sample
241015-1p5b3staqj
-
MD5
4a2c1c9208c5d223319851fd1149fcd5
-
SHA1
f34c82381fc105142e97bd59cc0e563d636ca1d4
-
SHA256
77f8cf1e697b7f4a9c8a3cb3d9820f71d0185f7bbe454d9ca674eea95a32863a
-
SHA512
986c0b808f9833edcff1374bdcf4fd00937cfcc80a4a1599aefaa6f8d5e0e981a861a28176ad50e823807b73c867632b22e3246aff655a3a38b6d69a71954be1
-
SSDEEP
196608:+4fsnI+0wlIIrw0DxFTxj7VGL97ntFacXquvxJo1y:+4fMl9rw8x3M5TtRXquv01y
Static task
static1
Behavioral task
behavioral1
Sample
4a2c1c9208c5d223319851fd1149fcd5_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Malware Config
Targets
-
-
Target
4a2c1c9208c5d223319851fd1149fcd5_JaffaCakes118
-
Size
8.5MB
-
MD5
4a2c1c9208c5d223319851fd1149fcd5
-
SHA1
f34c82381fc105142e97bd59cc0e563d636ca1d4
-
SHA256
77f8cf1e697b7f4a9c8a3cb3d9820f71d0185f7bbe454d9ca674eea95a32863a
-
SHA512
986c0b808f9833edcff1374bdcf4fd00937cfcc80a4a1599aefaa6f8d5e0e981a861a28176ad50e823807b73c867632b22e3246aff655a3a38b6d69a71954be1
-
SSDEEP
196608:+4fsnI+0wlIIrw0DxFTxj7VGL97ntFacXquvxJo1y:+4fMl9rw8x3M5TtRXquv01y
Score8/10-
Checks if the Android device is rooted.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Reads information about phone network operator.
-
MITRE ATT&CK Mobile v15
Defense Evasion
Execution Guardrails
1Geofencing
1Virtualization/Sandbox Evasion
1System Checks
1