General
-
Target
fed675f8a89c3139c9d8aa5420c969dc_JaffaCakes118
-
Size
20.3MB
-
Sample
240421-j3p1waeg56
-
MD5
fed675f8a89c3139c9d8aa5420c969dc
-
SHA1
ec06b387de4c61d6a38edae391eb57e58a44502d
-
SHA256
d6d0651294e6f93c6351b15b7ba95d7990055b560e4c5b15138e228ac0002305
-
SHA512
17ff24e87214f59c7ad9d1eab45c5702988697b9bd28778b03549a3e6831cd30bd3705ad36a4c1f4c656842013b4771000ddb6438f03fcad4223d011520341f5
-
SSDEEP
393216:fG1FgEzsZu3cm8jbvXYj8fBxjs6p2vOngQhfzHsrg6zPlaRH8Pcg7PA:O1FgmskAbYjQBxs6pQcgQBzaYRHW7PA
Static task
static1
Behavioral task
behavioral1
Sample
fed675f8a89c3139c9d8aa5420c969dc_JaffaCakes118.apk
Resource
android-x86-arm-20240221-en
Malware Config
Targets
-
-
Target
fed675f8a89c3139c9d8aa5420c969dc_JaffaCakes118
-
Size
20.3MB
-
MD5
fed675f8a89c3139c9d8aa5420c969dc
-
SHA1
ec06b387de4c61d6a38edae391eb57e58a44502d
-
SHA256
d6d0651294e6f93c6351b15b7ba95d7990055b560e4c5b15138e228ac0002305
-
SHA512
17ff24e87214f59c7ad9d1eab45c5702988697b9bd28778b03549a3e6831cd30bd3705ad36a4c1f4c656842013b4771000ddb6438f03fcad4223d011520341f5
-
SSDEEP
393216:fG1FgEzsZu3cm8jbvXYj8fBxjs6p2vOngQhfzHsrg6zPlaRH8Pcg7PA:O1FgmskAbYjQBxs6pQcgQBzaYRHW7PA
Score8/10-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Acquires the wake lock
-
Checks if the internet connection is available
-
Reads information about phone network operator.
-
Listens for changes in the sensor environment (might be used to detect emulation)
-
MITRE ATT&CK Mobile v15
Defense Evasion
Hide Artifacts
1User Evasion
1Virtualization/Sandbox Evasion
1System Checks
1