General
-
Target
fa84ca282f3b047f13106e006ae930ba_JaffaCakes118
-
Size
25.7MB
-
Sample
240419-rz9j4seh24
-
MD5
fa84ca282f3b047f13106e006ae930ba
-
SHA1
9d84c549de34ac38c85b8a793f24faa88fa0aee1
-
SHA256
934145fa41c3cce105c994c9fe5129b9976c8d929107a53775b977df6c25d768
-
SHA512
ca490a8b278a939aa09e3f66f56412fcfb8672b86c0a8fde58d2133e797e7bb21dd99aebbb35ba395c07bbce29b63bbe6e91e58d09fdfbec52f357b649bd8bf4
-
SSDEEP
786432:eme8i7o6+8Qe+Xjwi9D9nyEHgFIQS1d78:6JouQe6wi9D9yEgIQsd78
Static task
static1
Behavioral task
behavioral1
Sample
fa84ca282f3b047f13106e006ae930ba_JaffaCakes118.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
fa84ca282f3b047f13106e006ae930ba_JaffaCakes118.apk
Resource
android-33-x64-arm64-20240229-en
Behavioral task
behavioral3
Sample
night.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral4
Sample
night.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral5
Sample
night.apk
Resource
android-x64-arm64-20240221-en
Behavioral task
behavioral6
Sample
white.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral7
Sample
white.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral8
Sample
white.apk
Resource
android-x64-arm64-20240221-en
Malware Config
Targets
-
-
Target
fa84ca282f3b047f13106e006ae930ba_JaffaCakes118
-
Size
25.7MB
-
MD5
fa84ca282f3b047f13106e006ae930ba
-
SHA1
9d84c549de34ac38c85b8a793f24faa88fa0aee1
-
SHA256
934145fa41c3cce105c994c9fe5129b9976c8d929107a53775b977df6c25d768
-
SHA512
ca490a8b278a939aa09e3f66f56412fcfb8672b86c0a8fde58d2133e797e7bb21dd99aebbb35ba395c07bbce29b63bbe6e91e58d09fdfbec52f357b649bd8bf4
-
SSDEEP
786432:eme8i7o6+8Qe+Xjwi9D9nyEHgFIQS1d78:6JouQe6wi9D9yEgIQsd78
Score8/10-
Queries information about running processes on the device.
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection.
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-
Listens for changes in the sensor environment (might be used to detect emulation)
-
-
-
Target
night.skin
-
Size
14KB
-
MD5
98746113dd1d6f112b027ce3d5102c00
-
SHA1
154e22cdc1398e00e08d8f50d9a4af702ad0bbb7
-
SHA256
725c50c35679ee46899962fb15d0b7f26bf1b95ffa355d48a087bec47f1a2494
-
SHA512
6ee7b1503f6936ffcad61c3a24c0f7c216433508b57c39193a63b3fe5c9fb303a4a9f5dc63fa8c6b99d993479ea0c9ceffc0671b7ac47c39c5d068c10a29f197
-
SSDEEP
192:jLIhd3KzevVrFSUu4gTQm+VT9G5DdozL/9gh:jLISoFSUu48Qm6e8L/Kh
Score1/10 -
-
-
Target
white.skin
-
Size
2KB
-
MD5
e46ca277e4779bd23408a130e1574a1c
-
SHA1
e8ea1d802720c8b659e97f0475fb981a4a047a91
-
SHA256
32bfaac1b365a514e6e123d8ff13d70e8261cafbf9cdc1d3b7d959961c1c1053
-
SHA512
56a24d1899c39c9ffa3fde0b63ee23cd9c13fc32b5254e0a6bf2fbe2776df8bb9830e68e8ff5d09665f821715f02a8eafc74bd96f65696e127dcbf1264c1e6c9
Score1/10 -
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Hide Artifacts
1User Evasion
1Virtualization/Sandbox Evasion
1System Checks
1