General
-
Target
54c3bf485ac8eb7f1ecb878087d079f7_JaffaCakes118
-
Size
1.7MB
-
Sample
241018-b2dmfs1hlk
-
MD5
54c3bf485ac8eb7f1ecb878087d079f7
-
SHA1
4aa4af2f381fd759e645e39766604299aff26539
-
SHA256
debc54302524272f9a7dae8ed48e5c2f2966f7f8586f3c85a1fcacf34eeb838b
-
SHA512
67717afb59ba39b5e0e0853b32c5552c43bcf4092297c7fe5a0322fc8de13a834431912c7b44071d09794b83283a6fd0a88be13ac73e0b596aea0030e3079c37
-
SSDEEP
49152:5d9XUGrU1tI9sBMRRxEvSdZdTwZTaW9IE5Y/e4G/PPquQ:P941tI9sBMTxE2Zd6x9X50mPS5
Static task
static1
Behavioral task
behavioral1
Sample
54c3bf485ac8eb7f1ecb878087d079f7_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Malware Config
Targets
-
-
Target
54c3bf485ac8eb7f1ecb878087d079f7_JaffaCakes118
-
Size
1.7MB
-
MD5
54c3bf485ac8eb7f1ecb878087d079f7
-
SHA1
4aa4af2f381fd759e645e39766604299aff26539
-
SHA256
debc54302524272f9a7dae8ed48e5c2f2966f7f8586f3c85a1fcacf34eeb838b
-
SHA512
67717afb59ba39b5e0e0853b32c5552c43bcf4092297c7fe5a0322fc8de13a834431912c7b44071d09794b83283a6fd0a88be13ac73e0b596aea0030e3079c37
-
SSDEEP
49152:5d9XUGrU1tI9sBMRRxEvSdZdTwZTaW9IE5Y/e4G/PPquQ:P941tI9sBMTxE2Zd6x9X50mPS5
Score8/10-
Checks if the Android device is rooted.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-