General
-
Target
42ed6ee99f37c2f2730f85156b2d8faa_JaffaCakes118
-
Size
404KB
-
Sample
240514-y7j3raeg81
-
MD5
42ed6ee99f37c2f2730f85156b2d8faa
-
SHA1
5cc0785645013e999776b1696bf619310b8e312c
-
SHA256
5b60a2cefa235a8d163bb0da2f253abccdd2931865e6affe6d1d8f9fd465f24f
-
SHA512
29f330282b23af8a39fabd80bc6bdf3e244dbfff1819195d3e74f2fcb29d42768ed65b2d9ebe10bc2f5db6f2746df4a6d36eebbf8a0e625ceb2be59c395601ac
-
SSDEEP
6144:8QrNRurRmmm7gMOqKFM/VVck9s+ld1pXCrfhikmk8F4nVEgltr9q/oYaSwuM+Crg:8C3HYGLawd1ELhjsK5trw3FvCpG
Static task
static1
Behavioral task
behavioral1
Sample
42ed6ee99f37c2f2730f85156b2d8faa_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
42ed6ee99f37c2f2730f85156b2d8faa_JaffaCakes118.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral3
Sample
42ed6ee99f37c2f2730f85156b2d8faa_JaffaCakes118.apk
Resource
android-x64-arm64-20240514-en
Malware Config
Targets
-
-
Target
42ed6ee99f37c2f2730f85156b2d8faa_JaffaCakes118
-
Size
404KB
-
MD5
42ed6ee99f37c2f2730f85156b2d8faa
-
SHA1
5cc0785645013e999776b1696bf619310b8e312c
-
SHA256
5b60a2cefa235a8d163bb0da2f253abccdd2931865e6affe6d1d8f9fd465f24f
-
SHA512
29f330282b23af8a39fabd80bc6bdf3e244dbfff1819195d3e74f2fcb29d42768ed65b2d9ebe10bc2f5db6f2746df4a6d36eebbf8a0e625ceb2be59c395601ac
-
SSDEEP
6144:8QrNRurRmmm7gMOqKFM/VVck9s+ld1pXCrfhikmk8F4nVEgltr9q/oYaSwuM+Crg:8C3HYGLawd1ELhjsK5trw3FvCpG
-
XLoader payload
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Queries the phone number (MSISDN for GSM devices)
-
Reads the content of the MMS message.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Acquires the wake lock
-
Checks if the internet connection is available
-
Reads information about phone network operator.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-