General
-
Target
d00c507fc93850d691e025b56724d91d_JaffaCakes118
-
Size
2.7MB
-
Sample
240405-lknffaha65
-
MD5
d00c507fc93850d691e025b56724d91d
-
SHA1
a50258d4438d4a8272e7c0d8738440c29e34d71d
-
SHA256
1df4a7de1532dd1787e9a8d488016323409ca8052b2afecf9855d864b6c9b315
-
SHA512
1f508e2b08770fb0f240b2e02d194818f1a195a4bfdb72c0695f17d1690d3611724d8cd8c7642a9f3d034dccb026de7bb460d2aa8c5492091923f9bdb58c4ca4
-
SSDEEP
49152:UdpGeZ+UDquS+InZDMKm4EcSowTlONuIaQhSPWFKwEVwrWv6pbGsTTSs+A8B:UdwSFDqbXnRPStluuILhIW4zwrM6pb12
Static task
static1
Behavioral task
behavioral1
Sample
d00c507fc93850d691e025b56724d91d_JaffaCakes118.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
d00c507fc93850d691e025b56724d91d_JaffaCakes118.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral3
Sample
d00c507fc93850d691e025b56724d91d_JaffaCakes118.apk
Resource
android-x64-arm64-20240221-en
Malware Config
Extracted
cerberus
http://161.97.75.127
Targets
-
-
Target
d00c507fc93850d691e025b56724d91d_JaffaCakes118
-
Size
2.7MB
-
MD5
d00c507fc93850d691e025b56724d91d
-
SHA1
a50258d4438d4a8272e7c0d8738440c29e34d71d
-
SHA256
1df4a7de1532dd1787e9a8d488016323409ca8052b2afecf9855d864b6c9b315
-
SHA512
1f508e2b08770fb0f240b2e02d194818f1a195a4bfdb72c0695f17d1690d3611724d8cd8c7642a9f3d034dccb026de7bb460d2aa8c5492091923f9bdb58c4ca4
-
SSDEEP
49152:UdpGeZ+UDquS+InZDMKm4EcSowTlONuIaQhSPWFKwEVwrWv6pbGsTTSs+A8B:UdwSFDqbXnRPStluuILhIW4zwrM6pb12
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Queries the phone number (MSISDN for GSM devices)
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
Listens for changes in the sensor environment (might be used to detect emulation)
-