General
-
Target
5525f083ee4879b4807bfd06d62b59a8_JaffaCakes118
-
Size
20.6MB
-
Sample
240518-rmq71afe88
-
MD5
5525f083ee4879b4807bfd06d62b59a8
-
SHA1
ce96f270d44efb762ab4624e2c47b27e09a17d2f
-
SHA256
5e41372abe4440263f655b7a09b5db548a8878a593ebfd1067ba156dcdb84a87
-
SHA512
3be452e310cecd8129244e25f47b457bc61004715c2128d2effc624de3878d84297b2825f22e3dc3b93430a75ebf8494d7d89677d160e2ef3e291697aa0b90e4
-
SSDEEP
393216:E4/mzsT2E9CCQLhVTGG3W8w9w9P7CmU3W8w9w9PuPM8eDLw3fP3Ux9ebhKweiJCj:E+l2SCdLqGGxw9jZUGxw9mUD3w3fPkx7
Static task
static1
Behavioral task
behavioral1
Sample
5525f083ee4879b4807bfd06d62b59a8_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
5525f083ee4879b4807bfd06d62b59a8_JaffaCakes118
-
Size
20.6MB
-
MD5
5525f083ee4879b4807bfd06d62b59a8
-
SHA1
ce96f270d44efb762ab4624e2c47b27e09a17d2f
-
SHA256
5e41372abe4440263f655b7a09b5db548a8878a593ebfd1067ba156dcdb84a87
-
SHA512
3be452e310cecd8129244e25f47b457bc61004715c2128d2effc624de3878d84297b2825f22e3dc3b93430a75ebf8494d7d89677d160e2ef3e291697aa0b90e4
-
SSDEEP
393216:E4/mzsT2E9CCQLhVTGG3W8w9w9P7CmU3W8w9w9PuPM8eDLw3fP3Ux9ebhKweiJCj:E+l2SCdLqGGxw9jZUGxw9mUD3w3fPkx7
Score8/10-
Checks if the Android device is rooted.
-
Checks known Qemu files.
Checks for known Qemu files that exist on Android virtual device images.
-
Checks known Qemu pipes.
Checks for known pipes used by the Android emulator to communicate with the host.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Reads information about phone network operator.
-
Listens for changes in the sensor environment (might be used to detect emulation)
-
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Execution Guardrails
1Geofencing
1Hide Artifacts
1User Evasion
1Virtualization/Sandbox Evasion
4System Checks
4