General
-
Target
452cc39649bfdfdd81de938f2ce93481_JaffaCakes118
-
Size
4.6MB
-
Sample
240330-1rdxxaga83
-
MD5
452cc39649bfdfdd81de938f2ce93481
-
SHA1
b499554198e09fd171bbdd8d1cd3a0711c2a6bbd
-
SHA256
5b62a449bdeff05e4bf7b6e42870ed4ad8d3f9a6cef66267b05295d8937e0b10
-
SHA512
1750ae273a2c3b0000a2371e42c9fd3299f667c55d3fa6cf27c0b5154b498a65ed07ae3075dd645f34ca148777e9bea2dd95d936973fce4ca943a4aad999fe1e
-
SSDEEP
98304:hoNuiDQ9wfSVdDp6gDkTjhJfB5oxlAuEk0Olk0msIQpfYgQ+Q67D2w:hKr4pVZp6PjbfskXX+fPQd67/
Static task
static1
Behavioral task
behavioral1
Sample
452cc39649bfdfdd81de938f2ce93481_JaffaCakes118.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
452cc39649bfdfdd81de938f2ce93481_JaffaCakes118.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral3
Sample
452cc39649bfdfdd81de938f2ce93481_JaffaCakes118.apk
Resource
android-x64-arm64-20240221-en
Malware Config
Targets
-
-
Target
452cc39649bfdfdd81de938f2ce93481_JaffaCakes118
-
Size
4.6MB
-
MD5
452cc39649bfdfdd81de938f2ce93481
-
SHA1
b499554198e09fd171bbdd8d1cd3a0711c2a6bbd
-
SHA256
5b62a449bdeff05e4bf7b6e42870ed4ad8d3f9a6cef66267b05295d8937e0b10
-
SHA512
1750ae273a2c3b0000a2371e42c9fd3299f667c55d3fa6cf27c0b5154b498a65ed07ae3075dd645f34ca148777e9bea2dd95d936973fce4ca943a4aad999fe1e
-
SSDEEP
98304:hoNuiDQ9wfSVdDp6gDkTjhJfB5oxlAuEk0Olk0msIQpfYgQ+Q67D2w:hKr4pVZp6PjbfskXX+fPQd67/
-
FluBot payload
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-