General
-
Target
631170cab53cef6a3cc8a73d35a88ec6_JaffaCakes118
-
Size
2.9MB
-
Sample
240401-a77baagg9w
-
MD5
631170cab53cef6a3cc8a73d35a88ec6
-
SHA1
a32828458410e5bfef4e18627f72456dd70727f1
-
SHA256
e75bcc316514dacde0453a0766b46bc7075159ff9ae31e1d955c48fb745bf97f
-
SHA512
a1a607418b6beae31483aa99a3d118195a7a315b45317dca134089091c792f03dbc1105f2983227a4fe303d4fe6bceec897d6832fb7693cb5c505230e3df14c2
-
SSDEEP
49152:EdIk26OLx32qt5iB2sqyzOdyTdl6jIefQdjMb8kYNBfnzz77kNJR:EqKO932qXidSEpwEyqjO8PNBfPsJR
Static task
static1
Behavioral task
behavioral1
Sample
631170cab53cef6a3cc8a73d35a88ec6_JaffaCakes118.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
631170cab53cef6a3cc8a73d35a88ec6_JaffaCakes118.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral3
Sample
631170cab53cef6a3cc8a73d35a88ec6_JaffaCakes118.apk
Resource
android-x64-arm64-20240221-en
Malware Config
Extracted
cerberus
https://budabelegedude111.xyz
Targets
-
-
Target
631170cab53cef6a3cc8a73d35a88ec6_JaffaCakes118
-
Size
2.9MB
-
MD5
631170cab53cef6a3cc8a73d35a88ec6
-
SHA1
a32828458410e5bfef4e18627f72456dd70727f1
-
SHA256
e75bcc316514dacde0453a0766b46bc7075159ff9ae31e1d955c48fb745bf97f
-
SHA512
a1a607418b6beae31483aa99a3d118195a7a315b45317dca134089091c792f03dbc1105f2983227a4fe303d4fe6bceec897d6832fb7693cb5c505230e3df14c2
-
SSDEEP
49152:EdIk26OLx32qt5iB2sqyzOdyTdl6jIefQdjMb8kYNBfnzz77kNJR:EqKO932qXidSEpwEyqjO8PNBfPsJR
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
Listens for changes in the sensor environment (might be used to detect emulation)
-