General
-
Target
44dfdad365f25447f8e79be1401e0c19_JaffaCakes118
-
Size
4.6MB
-
Sample
240515-g5kstsch2w
-
MD5
44dfdad365f25447f8e79be1401e0c19
-
SHA1
783c6f2933604b23ef26c41d412a9405dfe95f8d
-
SHA256
57f142689ec1ac61e26017f370aa718f78bb6150a2b38f221f12a3bcd1889e9a
-
SHA512
c03ba7c62a41f29ec3c749dcb07ea8f1acaeeb5daa96a8d7aa09e0263649f0714b78f0b8895465619b5989e0b8538c33663540b2ebd43baab10ce5e72d5bbf45
-
SSDEEP
98304:ABFnZK1J+YHQnBsDWpkp7uGrCVEyG26EfLsm5YmZZIgajGFdZhMSiKbfyC1J:gFZ4+CQnBSJ21djXFd/ricx1J
Static task
static1
Behavioral task
behavioral1
Sample
44dfdad365f25447f8e79be1401e0c19_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
44dfdad365f25447f8e79be1401e0c19_JaffaCakes118.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral3
Sample
44dfdad365f25447f8e79be1401e0c19_JaffaCakes118.apk
Resource
android-x64-arm64-20240514-en
Behavioral task
behavioral4
Sample
classes.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral5
Sample
classes.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral6
Sample
classes.apk
Resource
android-x64-arm64-20240514-en
Malware Config
Targets
-
-
Target
44dfdad365f25447f8e79be1401e0c19_JaffaCakes118
-
Size
4.6MB
-
MD5
44dfdad365f25447f8e79be1401e0c19
-
SHA1
783c6f2933604b23ef26c41d412a9405dfe95f8d
-
SHA256
57f142689ec1ac61e26017f370aa718f78bb6150a2b38f221f12a3bcd1889e9a
-
SHA512
c03ba7c62a41f29ec3c749dcb07ea8f1acaeeb5daa96a8d7aa09e0263649f0714b78f0b8895465619b5989e0b8538c33663540b2ebd43baab10ce5e72d5bbf45
-
SSDEEP
98304:ABFnZK1J+YHQnBsDWpkp7uGrCVEyG26EfLsm5YmZZIgajGFdZhMSiKbfyC1J:gFZ4+CQnBSJ21djXFd/ricx1J
-
Checks Android system properties for emulator presence.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the mobile country code (MCC)
-
Queries the phone number (MSISDN for GSM devices)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-
-
-
Target
classes.zip
-
Size
214KB
-
MD5
e25caab92801bd1ab7f26fabf737044f
-
SHA1
9bd442d9f7a4c63a4118acf5deb7652b0a1a84e9
-
SHA256
644a85343ea715ccc73bdfbcd7cade6cfdfb4b1a30d1a2330bb2ba9cb03dde06
-
SHA512
6288c4cce3205513f3d520e1f055c1fa3dd6bd57b0c1af7ae09700f860524edfb264e2d2140541d2ea578dc5e66eff5c90b5e10bb19bcdd56146116f3e889535
-
SSDEEP
6144:jVMo78hzLgFbf9TdBuAvSUDeEwP8PEH43WSgPo:jm3h6pdBBqEwEEH43/R
Score1/10 -
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Virtualization/Sandbox Evasion
2System Checks
2