General
-
Target
346c9329ce7029856886bb4c3d312720_JaffaCakes118
-
Size
14.1MB
-
Sample
240511-nvt23see6v
-
MD5
346c9329ce7029856886bb4c3d312720
-
SHA1
7f14b82135c8fc7b8b5c5c737474bbb5b5e2d7c1
-
SHA256
c43165054c8874c9d661fa9c08116bd954db34666d61f684e1228952dd6c51da
-
SHA512
14009dd097fd1564cf063a44c819e71493e7b9270f968da4fb078ee104a569e826d979445fe0797c30623f73ab31204303334633e63cea042c660f4846ca5ff4
-
SSDEEP
393216:Q2YvffI23qX1Acku6F0lDXYSUBiRKzNVY2w7fZ2j:Q2En9KickT0lDvUCeNVY9xe
Static task
static1
Behavioral task
behavioral1
Sample
346c9329ce7029856886bb4c3d312720_JaffaCakes118.apk
Resource
android-x86-arm-20240506-en
Behavioral task
behavioral2
Sample
346c9329ce7029856886bb4c3d312720_JaffaCakes118.apk
Resource
android-x64-20240506-en
Malware Config
Targets
-
-
Target
346c9329ce7029856886bb4c3d312720_JaffaCakes118
-
Size
14.1MB
-
MD5
346c9329ce7029856886bb4c3d312720
-
SHA1
7f14b82135c8fc7b8b5c5c737474bbb5b5e2d7c1
-
SHA256
c43165054c8874c9d661fa9c08116bd954db34666d61f684e1228952dd6c51da
-
SHA512
14009dd097fd1564cf063a44c819e71493e7b9270f968da4fb078ee104a569e826d979445fe0797c30623f73ab31204303334633e63cea042c660f4846ca5ff4
-
SSDEEP
393216:Q2YvffI23qX1Acku6F0lDXYSUBiRKzNVY2w7fZ2j:Q2En9KickT0lDvUCeNVY9xe
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries information about the current nearby Wi-Fi networks
Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-
MITRE ATT&CK Mobile v15
Defense Evasion
Execution Guardrails
1Geofencing
1Virtualization/Sandbox Evasion
2System Checks
2