General
-
Target
4bf739f82cf01d051be37a2503c0cdf7_JaffaCakes118
-
Size
6.2MB
-
Sample
240331-d2hmhsda4v
-
MD5
4bf739f82cf01d051be37a2503c0cdf7
-
SHA1
798fa8eba6ec79bf1811e8a70f94d46f30d4cebd
-
SHA256
d3f97db83c40f59b19c9e958e552f1fa77defc7f79d4e1e366ccb72edba8dcb4
-
SHA512
fb93a34de7cd9bd0439e3fb1c8108ce14ec0d4f69c9de3d87e1c235be22b9fe88b55fb55fa6a955d70c0eed6914516fa226dab315f6d6cf73f0a04dd8da33822
-
SSDEEP
196608:FBoDy/72edU3YtJqf1UUdsVRwU9fV9q+F:FuiUotJqDWL795F
Behavioral task
behavioral1
Sample
4bf739f82cf01d051be37a2503c0cdf7_JaffaCakes118.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
4bf739f82cf01d051be37a2503c0cdf7_JaffaCakes118.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral3
Sample
4bf739f82cf01d051be37a2503c0cdf7_JaffaCakes118.apk
Resource
android-x64-arm64-20240221-en
Malware Config
Targets
-
-
Target
4bf739f82cf01d051be37a2503c0cdf7_JaffaCakes118
-
Size
6.2MB
-
MD5
4bf739f82cf01d051be37a2503c0cdf7
-
SHA1
798fa8eba6ec79bf1811e8a70f94d46f30d4cebd
-
SHA256
d3f97db83c40f59b19c9e958e552f1fa77defc7f79d4e1e366ccb72edba8dcb4
-
SHA512
fb93a34de7cd9bd0439e3fb1c8108ce14ec0d4f69c9de3d87e1c235be22b9fe88b55fb55fa6a955d70c0eed6914516fa226dab315f6d6cf73f0a04dd8da33822
-
SSDEEP
196608:FBoDy/72edU3YtJqf1UUdsVRwU9fV9q+F:FuiUotJqDWL795F
Score7/10-
Checks known Qemu pipes.
Checks for known pipes used by the Android emulator to communicate with the host.
-
Acquires the wake lock
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-