General
-
Target
4a415e1d6c02c1fa9dea767890bce4d1_JaffaCakes118
-
Size
21.9MB
-
Sample
240516-klgtlscd61
-
MD5
4a415e1d6c02c1fa9dea767890bce4d1
-
SHA1
61bc55231fc49aec89cc60550ca90332065c8bb1
-
SHA256
e0f5062a518bcd87f6cc18a4eeed053013f7580fca02634827a3cd59e2fb70d3
-
SHA512
b18bc1916547e44eea9b2d2054ab1d962c0448b0220d041f712fb9d4f8059d0a32ed114892ad818522a4558503653cae5c72c77411a8cfd03ab41d474cd817ce
-
SSDEEP
393216:zOICRcnI9uNiGYPhnVYNUPn0Wfmp25X7+uUXl78/I0lqyPzd6dunVxw:z3CRKLiGYXYslBX6uq70l7J6En7w
Static task
static1
Behavioral task
behavioral1
Sample
4a415e1d6c02c1fa9dea767890bce4d1_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
4a415e1d6c02c1fa9dea767890bce4d1_JaffaCakes118
-
Size
21.9MB
-
MD5
4a415e1d6c02c1fa9dea767890bce4d1
-
SHA1
61bc55231fc49aec89cc60550ca90332065c8bb1
-
SHA256
e0f5062a518bcd87f6cc18a4eeed053013f7580fca02634827a3cd59e2fb70d3
-
SHA512
b18bc1916547e44eea9b2d2054ab1d962c0448b0220d041f712fb9d4f8059d0a32ed114892ad818522a4558503653cae5c72c77411a8cfd03ab41d474cd817ce
-
SSDEEP
393216:zOICRcnI9uNiGYPhnVYNUPn0Wfmp25X7+uUXl78/I0lqyPzd6dunVxw:z3CRKLiGYXYslBX6uq70l7J6En7w
-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries information about the current nearby Wi-Fi networks
Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Acquires the wake lock
-
Checks if the internet connection is available
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-
Listens for changes in the sensor environment (might be used to detect emulation)
-
MITRE ATT&CK Mobile v15
Defense Evasion
Execution Guardrails
1Geofencing
1Hide Artifacts
1User Evasion
1Virtualization/Sandbox Evasion
2System Checks
2