General
-
Target
7e5caf6daf51ca0924bdc936a1de5943_JaffaCakes118
-
Size
241KB
-
Sample
240402-anvhdabf46
-
MD5
7e5caf6daf51ca0924bdc936a1de5943
-
SHA1
ddb11dd2fe8f537526835648410a0d6a61288a61
-
SHA256
927720e4e2b6d946b3e228257c4e41c6e9e5ee147ab21ec3ebc94f0f15382828
-
SHA512
3df61812a76bf150beff225c71c89e84622c07cf07201817946d44876682ea6205b1c7265ede855fefb4b3fd8be0e2f3d316e481d2185e7cd286d18dc1d00003
-
SSDEEP
6144:+9mUDLD8BQLAIhofbtp/35A7O14HFfWNORdVBAPp0HWNOR173BAZ1z:+5DXsQsIebF1csNORd8PZNORATz
Static task
static1
Behavioral task
behavioral1
Sample
7e5caf6daf51ca0924bdc936a1de5943_JaffaCakes118.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
7e5caf6daf51ca0924bdc936a1de5943_JaffaCakes118.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral3
Sample
7e5caf6daf51ca0924bdc936a1de5943_JaffaCakes118.apk
Resource
android-x64-arm64-20240221-en
Malware Config
Extracted
cerberus
https://budgetkiralik.com
Targets
-
-
Target
7e5caf6daf51ca0924bdc936a1de5943_JaffaCakes118
-
Size
241KB
-
MD5
7e5caf6daf51ca0924bdc936a1de5943
-
SHA1
ddb11dd2fe8f537526835648410a0d6a61288a61
-
SHA256
927720e4e2b6d946b3e228257c4e41c6e9e5ee147ab21ec3ebc94f0f15382828
-
SHA512
3df61812a76bf150beff225c71c89e84622c07cf07201817946d44876682ea6205b1c7265ede855fefb4b3fd8be0e2f3d316e481d2185e7cd286d18dc1d00003
-
SSDEEP
6144:+9mUDLD8BQLAIhofbtp/35A7O14HFfWNORdVBAPp0HWNOR173BAZ1z:+5DXsQsIebF1csNORd8PZNORATz
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
Listens for changes in the sensor environment (might be used to detect emulation)
-