General
-
Target
517ead892a02fb01c80b8f86d84edf1d_JaffaCakes118
-
Size
7.3MB
-
Sample
241017-k5nfha1dnf
-
MD5
517ead892a02fb01c80b8f86d84edf1d
-
SHA1
3bf7841b63fff2d3dcaf7227b1c2b6e1f4018351
-
SHA256
069a36e703dca25d2dd963a6faa495e9b2982e62d067bb0fe03ff1d5a67d725a
-
SHA512
a781069dd52d8491df0b9a961861ad41035bbf694418956dde986a6dffe6fde32b9b0a3b304fab549df5c97cdb6de5877cd2729337dae7ad2dfee786b23f6bf0
-
SSDEEP
196608:FeBnRHblkyKS5gsnLrVR3Ml+hyIFGQGXj4XLf3BPBMQhEJeH+K/ljtSwCTn:FeHX5xfVRiI0EFPK5x08win
Static task
static1
Behavioral task
behavioral1
Sample
517ead892a02fb01c80b8f86d84edf1d_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Malware Config
Targets
-
-
Target
517ead892a02fb01c80b8f86d84edf1d_JaffaCakes118
-
Size
7.3MB
-
MD5
517ead892a02fb01c80b8f86d84edf1d
-
SHA1
3bf7841b63fff2d3dcaf7227b1c2b6e1f4018351
-
SHA256
069a36e703dca25d2dd963a6faa495e9b2982e62d067bb0fe03ff1d5a67d725a
-
SHA512
a781069dd52d8491df0b9a961861ad41035bbf694418956dde986a6dffe6fde32b9b0a3b304fab549df5c97cdb6de5877cd2729337dae7ad2dfee786b23f6bf0
-
SSDEEP
196608:FeBnRHblkyKS5gsnLrVR3Ml+hyIFGQGXj4XLf3BPBMQhEJeH+K/ljtSwCTn:FeHX5xfVRiI0EFPK5x08win
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-