General
-
Target
a7e1a12eb27b3ee2209dffa1a59f58c8_JaffaCakes118
-
Size
444KB
-
Sample
240403-1zsq2aec2t
-
MD5
a7e1a12eb27b3ee2209dffa1a59f58c8
-
SHA1
bff82146d55983003e8da6b77a5bd8eee898ed72
-
SHA256
c92a7d2f90ed8bdc73a7ed3fef7bb98cc86b875a939c2b5d2b01ca6db71f98d8
-
SHA512
bdbbfbcb8a2744066026f0718bdb961a22f6e86b52cfb9e34368bfc7b95e3f07e4755e860c82f1a743223b82b1743c23ed6693f5ef3553f2955bbe270284f1f2
-
SSDEEP
12288:tf51spL11E3VShd+qr1svgrruWUwSkOLreoWfT:tf5sJ1iVS/fr1ugryWUwSkOXeoWL
Static task
static1
Behavioral task
behavioral1
Sample
a7e1a12eb27b3ee2209dffa1a59f58c8_JaffaCakes118.apk
Resource
android-x86-arm-20240221-en
Malware Config
Targets
-
-
Target
a7e1a12eb27b3ee2209dffa1a59f58c8_JaffaCakes118
-
Size
444KB
-
MD5
a7e1a12eb27b3ee2209dffa1a59f58c8
-
SHA1
bff82146d55983003e8da6b77a5bd8eee898ed72
-
SHA256
c92a7d2f90ed8bdc73a7ed3fef7bb98cc86b875a939c2b5d2b01ca6db71f98d8
-
SHA512
bdbbfbcb8a2744066026f0718bdb961a22f6e86b52cfb9e34368bfc7b95e3f07e4755e860c82f1a743223b82b1743c23ed6693f5ef3553f2955bbe270284f1f2
-
SSDEEP
12288:tf51spL11E3VShd+qr1svgrruWUwSkOLreoWfT:tf5sJ1iVS/fr1ugryWUwSkOXeoWL
-
XLoader payload
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Reads the content of the MMS message.
-
Acquires the wake lock
-