General
-
Target
702a0cc93e3f677f9d281c9cf4311d01_JaffaCakes118
-
Size
4.7MB
-
Sample
241023-wmbjrsshlf
-
MD5
702a0cc93e3f677f9d281c9cf4311d01
-
SHA1
daf8d41e234be8fa8ac8e54a343be4e2d3691377
-
SHA256
9077784e2d0b6441557d9df659523c3537d0ec07fbbe60cd740c993ac7ebfa04
-
SHA512
927e881ac8d6168278bd8dc61119829b4c6820a3284045159daf4d2e2eda076c66370add757b4f4f07762b2b6584289361cf9469bbb89ba04c986158d25e1765
-
SSDEEP
98304:ntg+05XWx/PTyaQ0HUJTvtHDzQfaZ6ewD4FHZY43coUQENOIgK1:H05cyaN8TxQwe4/Y4qNO2
Static task
static1
Behavioral task
behavioral1
Sample
702a0cc93e3f677f9d281c9cf4311d01_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
702a0cc93e3f677f9d281c9cf4311d01_JaffaCakes118.apk
Resource
android-x64-20240624-en
Malware Config
Targets
-
-
Target
702a0cc93e3f677f9d281c9cf4311d01_JaffaCakes118
-
Size
4.7MB
-
MD5
702a0cc93e3f677f9d281c9cf4311d01
-
SHA1
daf8d41e234be8fa8ac8e54a343be4e2d3691377
-
SHA256
9077784e2d0b6441557d9df659523c3537d0ec07fbbe60cd740c993ac7ebfa04
-
SHA512
927e881ac8d6168278bd8dc61119829b4c6820a3284045159daf4d2e2eda076c66370add757b4f4f07762b2b6584289361cf9469bbb89ba04c986158d25e1765
-
SSDEEP
98304:ntg+05XWx/PTyaQ0HUJTvtHDzQfaZ6ewD4FHZY43coUQENOIgK1:H05cyaN8TxQwe4/Y4qNO2
-
Checks if the Android device is rooted.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-