General
-
Target
be19ba6e627b0cb5a1e4acb7c725a240_JaffaCakes118
-
Size
444KB
-
Sample
240404-vsvzxsdc9s
-
MD5
be19ba6e627b0cb5a1e4acb7c725a240
-
SHA1
5f4b437ce703ad85ec0d52a83a8f96c2f9491c29
-
SHA256
dc2c8a143099b03f2de31b05cf02a7dc68e88b330c8f5a7f9536c69963293380
-
SHA512
89b376176d63554c620fc42195cd03dbdcf371351fde90bf4ccfb6f2362373d8cf283190b67b0d3e8f3fb1604955749f779ba8fd47473f23b8e81bccd82ba663
-
SSDEEP
12288:wbVQmt51spL11E3VShd+qr1svgrruW/a/xDRQqtGlU:w5QI5sJ1iVS/fr1ugryWmR9Qm
Static task
static1
Behavioral task
behavioral1
Sample
be19ba6e627b0cb5a1e4acb7c725a240_JaffaCakes118.apk
Resource
android-x86-arm-20240221-en
Malware Config
Targets
-
-
Target
be19ba6e627b0cb5a1e4acb7c725a240_JaffaCakes118
-
Size
444KB
-
MD5
be19ba6e627b0cb5a1e4acb7c725a240
-
SHA1
5f4b437ce703ad85ec0d52a83a8f96c2f9491c29
-
SHA256
dc2c8a143099b03f2de31b05cf02a7dc68e88b330c8f5a7f9536c69963293380
-
SHA512
89b376176d63554c620fc42195cd03dbdcf371351fde90bf4ccfb6f2362373d8cf283190b67b0d3e8f3fb1604955749f779ba8fd47473f23b8e81bccd82ba663
-
SSDEEP
12288:wbVQmt51spL11E3VShd+qr1svgrruW/a/xDRQqtGlU:w5QI5sJ1iVS/fr1ugryWmR9Qm
-
XLoader payload
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Reads the content of the MMS message.
-
Acquires the wake lock
-