General
-
Target
ebc1e608080227a13f173612ae3136e1_JaffaCakes118
-
Size
2.7MB
-
Sample
240410-xjfvrage57
-
MD5
ebc1e608080227a13f173612ae3136e1
-
SHA1
18770445ea731c509beb7322a98c0477f7b8d87c
-
SHA256
00ec32ae4b2f32c99a8053fb0b7a5dacdfdad2fa1981f058919cc484b4a5924c
-
SHA512
0a2b51f02b2916598d0c8d6b4d33b24d8f2adbb34d1ba81eaaadd1420acc68c8e6e73e875ed337a14b57192798395617fb18f2691fa6744865d96834ef0b618f
-
SSDEEP
49152:YxHjSl9QRd4g6nRw8ysPcwf0THzCUIfuI5MX/OUeav6oOMor7uU:YxHWURd4gARwPwWzC7fdi2UWrMu7f
Static task
static1
Behavioral task
behavioral1
Sample
ebc1e608080227a13f173612ae3136e1_JaffaCakes118.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
ebc1e608080227a13f173612ae3136e1_JaffaCakes118.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral3
Sample
ebc1e608080227a13f173612ae3136e1_JaffaCakes118.apk
Resource
android-x64-arm64-20240221-en
Malware Config
Extracted
cerberus
http://161.97.68.93
Targets
-
-
Target
ebc1e608080227a13f173612ae3136e1_JaffaCakes118
-
Size
2.7MB
-
MD5
ebc1e608080227a13f173612ae3136e1
-
SHA1
18770445ea731c509beb7322a98c0477f7b8d87c
-
SHA256
00ec32ae4b2f32c99a8053fb0b7a5dacdfdad2fa1981f058919cc484b4a5924c
-
SHA512
0a2b51f02b2916598d0c8d6b4d33b24d8f2adbb34d1ba81eaaadd1420acc68c8e6e73e875ed337a14b57192798395617fb18f2691fa6744865d96834ef0b618f
-
SSDEEP
49152:YxHjSl9QRd4g6nRw8ysPcwf0THzCUIfuI5MX/OUeav6oOMor7uU:YxHWURd4gARwPwWzC7fdi2UWrMu7f
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Queries the phone number (MSISDN for GSM devices)
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
Listens for changes in the sensor environment (might be used to detect emulation)
-