General
-
Target
f50a8b6f416d2efb30fe6b2b5f83b9da_JaffaCakes118
-
Size
2.7MB
-
Sample
240417-e585badh27
-
MD5
f50a8b6f416d2efb30fe6b2b5f83b9da
-
SHA1
da162c0a3ae612ee779ff781e60b4362880fc7a8
-
SHA256
cf3bd3c242555867a1e6bdd07e7c9dcc5df5ba5cf15e24ed12ac7e1bc533f829
-
SHA512
ed3663d0a26262080617d1d7d4e665b772468bfb0f4f9e65fac79649a4db9ee5eeb624e79372a3c50abc4537380e4512484397ae3d6c8cb72a882647598669f7
-
SSDEEP
49152:s61N+7Je9Q2uXqn3xz0ujzfowyw5ueQ4HM+8GyOUIXCbic3xN1i937reqK:B1Mk9QzXqn3tjzwwyw5hQ4H2GyOUIybv
Static task
static1
Behavioral task
behavioral1
Sample
f50a8b6f416d2efb30fe6b2b5f83b9da_JaffaCakes118.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
f50a8b6f416d2efb30fe6b2b5f83b9da_JaffaCakes118.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral3
Sample
f50a8b6f416d2efb30fe6b2b5f83b9da_JaffaCakes118.apk
Resource
android-x64-arm64-20240221-en
Malware Config
Extracted
cerberus
http://161.97.68.93
Targets
-
-
Target
f50a8b6f416d2efb30fe6b2b5f83b9da_JaffaCakes118
-
Size
2.7MB
-
MD5
f50a8b6f416d2efb30fe6b2b5f83b9da
-
SHA1
da162c0a3ae612ee779ff781e60b4362880fc7a8
-
SHA256
cf3bd3c242555867a1e6bdd07e7c9dcc5df5ba5cf15e24ed12ac7e1bc533f829
-
SHA512
ed3663d0a26262080617d1d7d4e665b772468bfb0f4f9e65fac79649a4db9ee5eeb624e79372a3c50abc4537380e4512484397ae3d6c8cb72a882647598669f7
-
SSDEEP
49152:s61N+7Je9Q2uXqn3xz0ujzfowyw5ueQ4HM+8GyOUIXCbic3xN1i937reqK:B1Mk9QzXqn3tjzwwyw5hQ4H2GyOUIybv
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Queries the phone number (MSISDN for GSM devices)
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
Listens for changes in the sensor environment (might be used to detect emulation)
-