General
-
Target
54e15f61c0fea43dc5e927d48df9b2ae_JaffaCakes118
-
Size
12.1MB
-
Sample
240518-qfxkrsda7x
-
MD5
54e15f61c0fea43dc5e927d48df9b2ae
-
SHA1
832622eb91b80e59feea83b379b025a06ca42e4f
-
SHA256
8dbaf348a900e1a4ad4729b877358c5774662337ebcc022464adb167a6a3e701
-
SHA512
979f858d1cc37665457cd1dadf295d0f0a12093639f61b06ee764b55ab1410d4bb6a1b2d37fb1984a3d6e105a13b4f3cde03b68a51c72092624546ef831aba09
-
SSDEEP
196608:+TibtBxgHmULRb+GWZ67DmuLukxWQ8WLkxS4Tj+laiZwG8cfJ94kuSl+7nlm1Sz:+TibtBxab+GWZ6FUBnS4HCfJDuSj1Sz
Static task
static1
Behavioral task
behavioral1
Sample
54e15f61c0fea43dc5e927d48df9b2ae_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
54e15f61c0fea43dc5e927d48df9b2ae_JaffaCakes118
-
Size
12.1MB
-
MD5
54e15f61c0fea43dc5e927d48df9b2ae
-
SHA1
832622eb91b80e59feea83b379b025a06ca42e4f
-
SHA256
8dbaf348a900e1a4ad4729b877358c5774662337ebcc022464adb167a6a3e701
-
SHA512
979f858d1cc37665457cd1dadf295d0f0a12093639f61b06ee764b55ab1410d4bb6a1b2d37fb1984a3d6e105a13b4f3cde03b68a51c72092624546ef831aba09
-
SSDEEP
196608:+TibtBxgHmULRb+GWZ67DmuLukxWQ8WLkxS4Tj+laiZwG8cfJ94kuSl+7nlm1Sz:+TibtBxab+GWZ6FUBnS4HCfJDuSj1Sz
Score8/10-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Reads information about phone network operator.
-
MITRE ATT&CK Mobile v15
Defense Evasion
Execution Guardrails
1Geofencing
1Virtualization/Sandbox Evasion
1System Checks
1