General
-
Target
fc0f20db5f8098e42d845492fcf3fca4_JaffaCakes118
-
Size
4.9MB
-
Sample
240420-ghg4esaa69
-
MD5
fc0f20db5f8098e42d845492fcf3fca4
-
SHA1
380e9f9d17c1f13e66d367f4f8726200e2dee07c
-
SHA256
81d22a908f7989dbafa747a6cc3ce42a1068d5bed9f34cc69fa86672b4d57e19
-
SHA512
d4fee4bd9bdaa012b57346c407a5e46eeb8908727686bd7022faf704a3baba81b6b6380b260e2f672fd8967b39a4d6f2008b6bf5e629efd163f01a30663d14a1
-
SSDEEP
98304:UxQ993O4ZwUzMnKTI5qkVe6/7Tr/njx/3lIM1bfzyck/IISqf+HW6sR:KQ993zwU6+I5DE07TrPV/3lImKj7g26y
Behavioral task
behavioral1
Sample
fc0f20db5f8098e42d845492fcf3fca4_JaffaCakes118.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
fc0f20db5f8098e42d845492fcf3fca4_JaffaCakes118.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral3
Sample
fc0f20db5f8098e42d845492fcf3fca4_JaffaCakes118.apk
Resource
android-x64-arm64-20240221-en
Malware Config
Extracted
smsfactory
http://smartlink.mobilelinks.xyz
Targets
-
-
Target
fc0f20db5f8098e42d845492fcf3fca4_JaffaCakes118
-
Size
4.9MB
-
MD5
fc0f20db5f8098e42d845492fcf3fca4
-
SHA1
380e9f9d17c1f13e66d367f4f8726200e2dee07c
-
SHA256
81d22a908f7989dbafa747a6cc3ce42a1068d5bed9f34cc69fa86672b4d57e19
-
SHA512
d4fee4bd9bdaa012b57346c407a5e46eeb8908727686bd7022faf704a3baba81b6b6380b260e2f672fd8967b39a4d6f2008b6bf5e629efd163f01a30663d14a1
-
SSDEEP
98304:UxQ993O4ZwUzMnKTI5qkVe6/7Tr/njx/3lIM1bfzyck/IISqf+HW6sR:KQ993zwU6+I5DE07TrPV/3lImKj7g26y
-
SMSFactory
SMSFactory is an Android SMS trojan malware first seen in Jun 2022.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Acquires the wake lock
-
Checks if the internet connection is available
-
Reads information about phone network operator.
-