General
-
Target
4a8d8c2a1f069d00369ae15361212380_JaffaCakes118
-
Size
432KB
-
Sample
240516-l68cqsga34
-
MD5
4a8d8c2a1f069d00369ae15361212380
-
SHA1
627095dd40707f0edd914f9286d9187641aa0acb
-
SHA256
ae43b1540ffb092c9a7c2549f2e56873ad05dc5e7155a4d2149e6f25e5dc0708
-
SHA512
6864fce106327234b74e786546d753e74b1a5f712d5eb2db3f87ac147f739f857a1f8fd0ec996913d410ebf16c102e6c63e7e53306031e22a347b97b0a522240
-
SSDEEP
12288:Yus31bG3Kx4mbmrAH9aqftoV5tUwvfqfJ:Y/pG30bmMH3k5rfqfJ
Static task
static1
Behavioral task
behavioral1
Sample
4a8d8c2a1f069d00369ae15361212380_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
4a8d8c2a1f069d00369ae15361212380_JaffaCakes118.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral3
Sample
4a8d8c2a1f069d00369ae15361212380_JaffaCakes118.apk
Resource
android-x64-arm64-20240514-en
Malware Config
Targets
-
-
Target
4a8d8c2a1f069d00369ae15361212380_JaffaCakes118
-
Size
432KB
-
MD5
4a8d8c2a1f069d00369ae15361212380
-
SHA1
627095dd40707f0edd914f9286d9187641aa0acb
-
SHA256
ae43b1540ffb092c9a7c2549f2e56873ad05dc5e7155a4d2149e6f25e5dc0708
-
SHA512
6864fce106327234b74e786546d753e74b1a5f712d5eb2db3f87ac147f739f857a1f8fd0ec996913d410ebf16c102e6c63e7e53306031e22a347b97b0a522240
-
SSDEEP
12288:Yus31bG3Kx4mbmrAH9aqftoV5tUwvfqfJ:Y/pG30bmMH3k5rfqfJ
-
XLoader payload
-
Checks if the Android device is rooted.
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Queries the phone number (MSISDN for GSM devices)
-
Reads the content of the MMS message.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Acquires the wake lock
-
Checks if the internet connection is available
-
Reads information about phone network operator.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-