General
-
Target
316104fce3b13aa8cc8ace57feba2379_JaffaCakes118
-
Size
14.8MB
-
Sample
240510-2jrdpsdg2y
-
MD5
316104fce3b13aa8cc8ace57feba2379
-
SHA1
5d5d98074dcecb9b1fc1338a7f05da769c6dfec0
-
SHA256
5e57bdd1bcd4da9a76316252e28d745d3663bb8c2f37ae5af5721edcac3d4989
-
SHA512
a9b3384734bedb19ed1350b59bf5432d6f4dd8d94598ecfac235e43e709308245ff04af656629e0a892223dd3b2121a4c1f44b5c577b06c61b75339dd5156686
-
SSDEEP
393216:p+2fFOOxtKenryjD6NVD8vamZnp19Cm6l5E65hJc:pTjKPjD6NV+awpijrRO
Behavioral task
behavioral1
Sample
316104fce3b13aa8cc8ace57feba2379_JaffaCakes118.apk
Resource
android-x86-arm-20240506-en
Behavioral task
behavioral2
Sample
316104fce3b13aa8cc8ace57feba2379_JaffaCakes118.apk
Resource
android-x64-20240506-en
Malware Config
Targets
-
-
Target
316104fce3b13aa8cc8ace57feba2379_JaffaCakes118
-
Size
14.8MB
-
MD5
316104fce3b13aa8cc8ace57feba2379
-
SHA1
5d5d98074dcecb9b1fc1338a7f05da769c6dfec0
-
SHA256
5e57bdd1bcd4da9a76316252e28d745d3663bb8c2f37ae5af5721edcac3d4989
-
SHA512
a9b3384734bedb19ed1350b59bf5432d6f4dd8d94598ecfac235e43e709308245ff04af656629e0a892223dd3b2121a4c1f44b5c577b06c61b75339dd5156686
-
SSDEEP
393216:p+2fFOOxtKenryjD6NVD8vamZnp19Cm6l5E65hJc:pTjKPjD6NV+awpijrRO
Score8/10-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Virtualization/Sandbox Evasion
2System Checks
2