General
-
Target
3aef0e5a7482a5c6a7324696f643f8bb_JaffaCakes118
-
Size
26.1MB
-
Sample
240512-tgadeagd66
-
MD5
3aef0e5a7482a5c6a7324696f643f8bb
-
SHA1
d5b6de88c88f552ae73c76117033d27350596f97
-
SHA256
8ffc27f1aa989918ce6236b6c73c8bed6789a8ab993486b76c08e4f64bb3e9af
-
SHA512
57a6ed93aaa82832e38da8804237c98eeee4ab99018c437fa1ccbddba5520fc91c309e1c9baa716692be77231d48c959610a4618009500e11b1ee1fc6cfcf71f
-
SSDEEP
786432:L4JTqojUU9ALYuenK7e8sb4GHpI51qECUaMEpZ:UqojUnLkK7e8sfH+5YEUXpZ
Static task
static1
Behavioral task
behavioral1
Sample
3aef0e5a7482a5c6a7324696f643f8bb_JaffaCakes118.apk
Resource
android-x86-arm-20240506-en
Malware Config
Targets
-
-
Target
3aef0e5a7482a5c6a7324696f643f8bb_JaffaCakes118
-
Size
26.1MB
-
MD5
3aef0e5a7482a5c6a7324696f643f8bb
-
SHA1
d5b6de88c88f552ae73c76117033d27350596f97
-
SHA256
8ffc27f1aa989918ce6236b6c73c8bed6789a8ab993486b76c08e4f64bb3e9af
-
SHA512
57a6ed93aaa82832e38da8804237c98eeee4ab99018c437fa1ccbddba5520fc91c309e1c9baa716692be77231d48c959610a4618009500e11b1ee1fc6cfcf71f
-
SSDEEP
786432:L4JTqojUU9ALYuenK7e8sb4GHpI51qECUaMEpZ:UqojUnLkK7e8sfH+5YEUXpZ
Score8/10-
Checks Android system properties for emulator presence.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Virtualization/Sandbox Evasion
3System Checks
3