General
-
Target
503ea2607ee4bfd730bf44791b424e85_JaffaCakes118
-
Size
2.6MB
-
Sample
240331-hzev3agd48
-
MD5
503ea2607ee4bfd730bf44791b424e85
-
SHA1
401cc3e67142b771338bfdfa3970b4447a81dd06
-
SHA256
10b1594b87010c09acb393d457417c240dc1962371e37988a1c804e93870541f
-
SHA512
718b75a5807c59a72e6149d365c5c7d28f04a2e5a7176ec2991a5555d9b32580c9de9dd77f13284bdbb5275dd8381867b0df24b5fc6b7d9001e70b578cd0d443
-
SSDEEP
49152:Dk4sAvFygukFZacB61rbXjVF6XLxLFFOLMmr6cTsH+aZhT5qOkRCP:Dk9CygBZn01vXzI5XOoXcsH+gQOQi
Static task
static1
Behavioral task
behavioral1
Sample
503ea2607ee4bfd730bf44791b424e85_JaffaCakes118.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
503ea2607ee4bfd730bf44791b424e85_JaffaCakes118.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral3
Sample
503ea2607ee4bfd730bf44791b424e85_JaffaCakes118.apk
Resource
android-x64-arm64-20240221-en
Malware Config
Extracted
cerberus
http://194.163.187.220
Targets
-
-
Target
503ea2607ee4bfd730bf44791b424e85_JaffaCakes118
-
Size
2.6MB
-
MD5
503ea2607ee4bfd730bf44791b424e85
-
SHA1
401cc3e67142b771338bfdfa3970b4447a81dd06
-
SHA256
10b1594b87010c09acb393d457417c240dc1962371e37988a1c804e93870541f
-
SHA512
718b75a5807c59a72e6149d365c5c7d28f04a2e5a7176ec2991a5555d9b32580c9de9dd77f13284bdbb5275dd8381867b0df24b5fc6b7d9001e70b578cd0d443
-
SSDEEP
49152:Dk4sAvFygukFZacB61rbXjVF6XLxLFFOLMmr6cTsH+aZhT5qOkRCP:Dk9CygBZn01vXzI5XOoXcsH+gQOQi
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
Listens for changes in the sensor environment (might be used to detect emulation)
-