General
-
Target
4783db571208265a90aa6ec32f8730be_JaffaCakes118
-
Size
6.3MB
-
Sample
240515-xcfamseb4w
-
MD5
4783db571208265a90aa6ec32f8730be
-
SHA1
4b414a5623a1ab5b004ab9bc2b9b7dca9a595728
-
SHA256
5daeed6df9a7bfdf4ccdff808452312d6d7547d44b1a9585e13d76e3c465d984
-
SHA512
2d3632e9794dda25dacd2008808b1cd2a1ffe91b045e38f55c9223cc066ad7b01c04f24efce399b3e2aaaada3312fef6b72ce084b93231c507a6a439563a39bd
-
SSDEEP
196608:lzD7U3pAeXLvrcmeEnA0hzc41iMokMysdhiU1rrsOMgXjl:p/U3pAeXvZdhXoktsdhtrsX0
Behavioral task
behavioral1
Sample
4783db571208265a90aa6ec32f8730be_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
4783db571208265a90aa6ec32f8730be_JaffaCakes118.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral3
Sample
4783db571208265a90aa6ec32f8730be_JaffaCakes118.apk
Resource
android-x64-arm64-20240514-en
Malware Config
Targets
-
-
Target
4783db571208265a90aa6ec32f8730be_JaffaCakes118
-
Size
6.3MB
-
MD5
4783db571208265a90aa6ec32f8730be
-
SHA1
4b414a5623a1ab5b004ab9bc2b9b7dca9a595728
-
SHA256
5daeed6df9a7bfdf4ccdff808452312d6d7547d44b1a9585e13d76e3c465d984
-
SHA512
2d3632e9794dda25dacd2008808b1cd2a1ffe91b045e38f55c9223cc066ad7b01c04f24efce399b3e2aaaada3312fef6b72ce084b93231c507a6a439563a39bd
-
SSDEEP
196608:lzD7U3pAeXLvrcmeEnA0hzc41iMokMysdhiU1rrsOMgXjl:p/U3pAeXvZdhXoktsdhtrsX0
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current nearby Wi-Fi networks
Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Acquires the wake lock
-
Checks if the internet connection is available
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-
Schedules tasks to execute at a specified time
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Virtualization/Sandbox Evasion
1System Checks
1