General
-
Target
4fa14f8459004366b6dcb15dbb60a4ee_JaffaCakes118
-
Size
200KB
-
Sample
240331-g8fchsfb81
-
MD5
4fa14f8459004366b6dcb15dbb60a4ee
-
SHA1
7c8b7b5866f5dba9a9ac858f5b627d96c69852e8
-
SHA256
ee26a8ae29a4e353b10c787838638a4233f9adacf315b69fcfc6d8e6c3a0371e
-
SHA512
d1da332b2b770a995f12b0f8e416c3e880aa63164e6b9e08cf2b2d910e5c4c06a62d6c9acad6c7f80a7eedcb5e7047213a3a311d5e242b8cf4f48d17f7874c70
-
SSDEEP
6144:QykS1f4iZzI7iVLu07HU8tRJtF0b8qRJthR0R:QyB1ftz3Vp7zJtgJt3O
Static task
static1
Behavioral task
behavioral1
Sample
4fa14f8459004366b6dcb15dbb60a4ee_JaffaCakes118.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
4fa14f8459004366b6dcb15dbb60a4ee_JaffaCakes118.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral3
Sample
4fa14f8459004366b6dcb15dbb60a4ee_JaffaCakes118.apk
Resource
android-x64-arm64-20240221-en
Malware Config
Extracted
cerberus
https://senigomdumben.com
Targets
-
-
Target
4fa14f8459004366b6dcb15dbb60a4ee_JaffaCakes118
-
Size
200KB
-
MD5
4fa14f8459004366b6dcb15dbb60a4ee
-
SHA1
7c8b7b5866f5dba9a9ac858f5b627d96c69852e8
-
SHA256
ee26a8ae29a4e353b10c787838638a4233f9adacf315b69fcfc6d8e6c3a0371e
-
SHA512
d1da332b2b770a995f12b0f8e416c3e880aa63164e6b9e08cf2b2d910e5c4c06a62d6c9acad6c7f80a7eedcb5e7047213a3a311d5e242b8cf4f48d17f7874c70
-
SSDEEP
6144:QykS1f4iZzI7iVLu07HU8tRJtF0b8qRJthR0R:QyB1ftz3Vp7zJtgJt3O
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
Listens for changes in the sensor environment (might be used to detect emulation)
-