General
-
Target
8c49a6a3051c272907667bc7effed5d4_JaffaCakes118
-
Size
17.9MB
-
Sample
241103-td6mfaxgrg
-
MD5
8c49a6a3051c272907667bc7effed5d4
-
SHA1
70750e7df02db36d249fdbb5ed0ea74373dc4716
-
SHA256
5375141c4f45bda9aad3b4d545b9bb95c93e2c0fa1faa913ba9a620aed63dc89
-
SHA512
1363715afc2ae63187d72fa849e789cf2958634afa53167a995b4ba62f9da6ab3b9741a49847cfb98fbb170d7551494c3dcd197c8e9dbe031139530534943f2b
-
SSDEEP
393216:fQYQj5xQCRULuscruby6z33pdym8ScxLmp:fQYs5xQdcruNpBcFmp
Static task
static1
Behavioral task
behavioral1
Sample
8c49a6a3051c272907667bc7effed5d4_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Malware Config
Targets
-
-
Target
8c49a6a3051c272907667bc7effed5d4_JaffaCakes118
-
Size
17.9MB
-
MD5
8c49a6a3051c272907667bc7effed5d4
-
SHA1
70750e7df02db36d249fdbb5ed0ea74373dc4716
-
SHA256
5375141c4f45bda9aad3b4d545b9bb95c93e2c0fa1faa913ba9a620aed63dc89
-
SHA512
1363715afc2ae63187d72fa849e789cf2958634afa53167a995b4ba62f9da6ab3b9741a49847cfb98fbb170d7551494c3dcd197c8e9dbe031139530534943f2b
-
SSDEEP
393216:fQYQj5xQCRULuscruby6z33pdym8ScxLmp:fQYs5xQdcruNpBcFmp
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current nearby Wi-Fi networks
Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-