General
-
Target
3a51ee2e0dfd8d049e26ab0025a62d51_JaffaCakes118
-
Size
295KB
-
Sample
240512-qlwwesbd79
-
MD5
3a51ee2e0dfd8d049e26ab0025a62d51
-
SHA1
53e0197e01cf57086f5685219457ad6ad772d719
-
SHA256
050d3c3f8152ab01c0b2cd1ada40adc9cd4f991908ca6f735c30b2814d89fde7
-
SHA512
e4af714b98b76807e1cd87321c2fb97cb4948ac9d96cfaa3a92a8f75c1ccdb04a6dbfa2df6505289552503360094d1755ffe1de88348d10c9ecf80fe494dd7c7
-
SSDEEP
6144:T5fxoPjb+g8xK2kHml4Us8DtKvUw5q2DGXAZRfZGWAdY46:T5GbKNxKv/UfD0vUF2DIaCWj
Static task
static1
Behavioral task
behavioral1
Sample
3a51ee2e0dfd8d049e26ab0025a62d51_JaffaCakes118.apk
Resource
android-x86-arm-20240506-en
Behavioral task
behavioral2
Sample
3a51ee2e0dfd8d049e26ab0025a62d51_JaffaCakes118.apk
Resource
android-x64-20240506-en
Behavioral task
behavioral3
Sample
3a51ee2e0dfd8d049e26ab0025a62d51_JaffaCakes118.apk
Resource
android-x64-arm64-20240506-en
Malware Config
Targets
-
-
Target
3a51ee2e0dfd8d049e26ab0025a62d51_JaffaCakes118
-
Size
295KB
-
MD5
3a51ee2e0dfd8d049e26ab0025a62d51
-
SHA1
53e0197e01cf57086f5685219457ad6ad772d719
-
SHA256
050d3c3f8152ab01c0b2cd1ada40adc9cd4f991908ca6f735c30b2814d89fde7
-
SHA512
e4af714b98b76807e1cd87321c2fb97cb4948ac9d96cfaa3a92a8f75c1ccdb04a6dbfa2df6505289552503360094d1755ffe1de88348d10c9ecf80fe494dd7c7
-
SSDEEP
6144:T5fxoPjb+g8xK2kHml4Us8DtKvUw5q2DGXAZRfZGWAdY46:T5GbKNxKv/UfD0vUF2DIaCWj
-
XLoader payload
-
Requests changing the default SMS application.
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Queries the phone number (MSISDN for GSM devices)
-
Reads the content of the MMS message.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Acquires the wake lock
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-