General
-
Target
75a837f084a1e986dcb432ef2ed3a125_JaffaCakes118
-
Size
2.8MB
-
Sample
240401-vpdw8sac2w
-
MD5
75a837f084a1e986dcb432ef2ed3a125
-
SHA1
9a92a835327840f32161067e0c6debd704df7c52
-
SHA256
9a6b68c82fe8faab69e63ae0309948a92f9c954564d6e0132ef3696f11662521
-
SHA512
e6319b95fd86307763475f68a81c09d27b3f6228f931dc4c462cb1eeade4b8d240ef8357fe1400fa3a4e1836741048d86fe6408dd04a3f3ecfe932527e58d261
-
SSDEEP
49152:OeaVQqOUYP7DqCDIYJO0rMZbm2SrViPfn3GudANNXC2Demh:FmQ7UIvqp2OPb5miPPGudANvh
Static task
static1
Behavioral task
behavioral1
Sample
75a837f084a1e986dcb432ef2ed3a125_JaffaCakes118.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
75a837f084a1e986dcb432ef2ed3a125_JaffaCakes118.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral3
Sample
75a837f084a1e986dcb432ef2ed3a125_JaffaCakes118.apk
Resource
android-x64-arm64-20240221-en
Malware Config
Extracted
cerberus
http://194.163.139.138
Targets
-
-
Target
75a837f084a1e986dcb432ef2ed3a125_JaffaCakes118
-
Size
2.8MB
-
MD5
75a837f084a1e986dcb432ef2ed3a125
-
SHA1
9a92a835327840f32161067e0c6debd704df7c52
-
SHA256
9a6b68c82fe8faab69e63ae0309948a92f9c954564d6e0132ef3696f11662521
-
SHA512
e6319b95fd86307763475f68a81c09d27b3f6228f931dc4c462cb1eeade4b8d240ef8357fe1400fa3a4e1836741048d86fe6408dd04a3f3ecfe932527e58d261
-
SSDEEP
49152:OeaVQqOUYP7DqCDIYJO0rMZbm2SrViPfn3GudANNXC2Demh:FmQ7UIvqp2OPb5miPPGudANvh
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
Listens for changes in the sensor environment (might be used to detect emulation)
-