General
-
Target
e64728c81528dbb27402173152d44699_JaffaCakes118
-
Size
149KB
-
Sample
240408-bema3scb29
-
MD5
e64728c81528dbb27402173152d44699
-
SHA1
405d053898053f8b0ba1efd657b784acec475518
-
SHA256
63c460bf2652832ccda5e0749a6d4c79ef1ce47d125d52407f3f0428cc131f38
-
SHA512
d43d0fc56da1775688b33a25481892dcc20e37457b50f23326340da34804e5c48ccbb053135a2b6ba78cba98d5fa5317b7922c046dced64b85a2a217211dc3e8
-
SSDEEP
3072:pP/VpWUPuN+ZgH84/vR0txKPnVBIVBQhPZhPAP:pP/VXUemVR0txi/I/SHM
Static task
static1
Behavioral task
behavioral1
Sample
e64728c81528dbb27402173152d44699_JaffaCakes118.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
e64728c81528dbb27402173152d44699_JaffaCakes118.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral3
Sample
e64728c81528dbb27402173152d44699_JaffaCakes118.apk
Resource
android-x64-arm64-20240221-en
Malware Config
Extracted
cerberus
https://izumi1377xishere.xyz
Targets
-
-
Target
e64728c81528dbb27402173152d44699_JaffaCakes118
-
Size
149KB
-
MD5
e64728c81528dbb27402173152d44699
-
SHA1
405d053898053f8b0ba1efd657b784acec475518
-
SHA256
63c460bf2652832ccda5e0749a6d4c79ef1ce47d125d52407f3f0428cc131f38
-
SHA512
d43d0fc56da1775688b33a25481892dcc20e37457b50f23326340da34804e5c48ccbb053135a2b6ba78cba98d5fa5317b7922c046dced64b85a2a217211dc3e8
-
SSDEEP
3072:pP/VpWUPuN+ZgH84/vR0txKPnVBIVBQhPZhPAP:pP/VXUemVR0txi/I/SHM
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Queries the phone number (MSISDN for GSM devices)
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
Listens for changes in the sensor environment (might be used to detect emulation)
-