General
-
Target
83d8646081701b607e9147a9a0bd90d6_JaffaCakes118
-
Size
2.6MB
-
Sample
240402-e9clxagg5t
-
MD5
83d8646081701b607e9147a9a0bd90d6
-
SHA1
1652440c6feadd9a43c90610763ed7a0a4c351b9
-
SHA256
9ba9ad408a114192254671b24b01af7980f879f3962232389ccc835acb87582a
-
SHA512
2218d890c725725215af03aafc8906f0481484c58212761a237708e205569d0fb9268615f63ac4b41064c0d85bbb1e488d9fd8c8a49e7b90bee32eb59e72947a
-
SSDEEP
49152:McYSsgUSH1q42IkAiqeXt2NEUEwI2wvLN6xyQw1GGz9S08oja80ZxKlqUqf2BG:MLSs9Eq45eVt2qU4NN6wVz40DjKHKE0G
Static task
static1
Behavioral task
behavioral1
Sample
83d8646081701b607e9147a9a0bd90d6_JaffaCakes118.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
83d8646081701b607e9147a9a0bd90d6_JaffaCakes118.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral3
Sample
83d8646081701b607e9147a9a0bd90d6_JaffaCakes118.apk
Resource
android-x64-arm64-20240221-en
Malware Config
Extracted
cerberus
http://194.163.187.220
Targets
-
-
Target
83d8646081701b607e9147a9a0bd90d6_JaffaCakes118
-
Size
2.6MB
-
MD5
83d8646081701b607e9147a9a0bd90d6
-
SHA1
1652440c6feadd9a43c90610763ed7a0a4c351b9
-
SHA256
9ba9ad408a114192254671b24b01af7980f879f3962232389ccc835acb87582a
-
SHA512
2218d890c725725215af03aafc8906f0481484c58212761a237708e205569d0fb9268615f63ac4b41064c0d85bbb1e488d9fd8c8a49e7b90bee32eb59e72947a
-
SSDEEP
49152:McYSsgUSH1q42IkAiqeXt2NEUEwI2wvLN6xyQw1GGz9S08oja80ZxKlqUqf2BG:MLSs9Eq45eVt2qU4NN6wVz40DjKHKE0G
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
Listens for changes in the sensor environment (might be used to detect emulation)
-