General
-
Target
6f78dfd49d82a125afb7cd72f31fcaab_JaffaCakes118
-
Size
6.6MB
-
Sample
241023-r5myasvhrf
-
MD5
6f78dfd49d82a125afb7cd72f31fcaab
-
SHA1
48cb220bc26916177d1bca087714e999ff51eec3
-
SHA256
482a99ae6b5193b601cd53dd123bb72161f3dc42d89d09b5e39b1c96de0081cf
-
SHA512
80b26da67c8fd74a780eee077e8b3f2b7f473d0f88e1292f18c59a4a74792bc83bf744561368b42f6ae3d8e24484b5b058ed93b0a5652bfb1a72d6a72afb306e
-
SSDEEP
196608:RWqiz/WrdMfB1+ciTkFKPklBjHPc71eafaYDwV:Rliz/WxaB1z7omBjkpSYDo
Static task
static1
Behavioral task
behavioral1
Sample
6f78dfd49d82a125afb7cd72f31fcaab_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Malware Config
Targets
-
-
Target
6f78dfd49d82a125afb7cd72f31fcaab_JaffaCakes118
-
Size
6.6MB
-
MD5
6f78dfd49d82a125afb7cd72f31fcaab
-
SHA1
48cb220bc26916177d1bca087714e999ff51eec3
-
SHA256
482a99ae6b5193b601cd53dd123bb72161f3dc42d89d09b5e39b1c96de0081cf
-
SHA512
80b26da67c8fd74a780eee077e8b3f2b7f473d0f88e1292f18c59a4a74792bc83bf744561368b42f6ae3d8e24484b5b058ed93b0a5652bfb1a72d6a72afb306e
-
SSDEEP
196608:RWqiz/WrdMfB1+ciTkFKPklBjHPc71eafaYDwV:Rliz/WxaB1z7omBjkpSYDo
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Reads information about phone network operator.
-