General
-
Target
56b6680c671b313fd889101b695707ee_JaffaCakes118
-
Size
26.6MB
-
Sample
240518-zlkylaeh3w
-
MD5
56b6680c671b313fd889101b695707ee
-
SHA1
7ad665ad64cb06c03aed846668d5e3907494102d
-
SHA256
1dbc2a8e6d66484ba05decb0b9e5e95f21ba41f65e354c15cd17b1ab53aefffc
-
SHA512
647e740628b5491a8417c0f1c8621c71e95725e0693535322cbdce193d539cdd43ef7b52d4ee613e9e6880f006126648624acc87d34420800f2191ced0fe4e0a
-
SSDEEP
786432:MIAxcyL+GJ/wUwzJMWjA2KuEqSQ0ZqFWxTNtR:QrLxJc1bAwxS0FWxTx
Static task
static1
Behavioral task
behavioral1
Sample
56b6680c671b313fd889101b695707ee_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
56b6680c671b313fd889101b695707ee_JaffaCakes118
-
Size
26.6MB
-
MD5
56b6680c671b313fd889101b695707ee
-
SHA1
7ad665ad64cb06c03aed846668d5e3907494102d
-
SHA256
1dbc2a8e6d66484ba05decb0b9e5e95f21ba41f65e354c15cd17b1ab53aefffc
-
SHA512
647e740628b5491a8417c0f1c8621c71e95725e0693535322cbdce193d539cdd43ef7b52d4ee613e9e6880f006126648624acc87d34420800f2191ced0fe4e0a
-
SSDEEP
786432:MIAxcyL+GJ/wUwzJMWjA2KuEqSQ0ZqFWxTNtR:QrLxJc1bAwxS0FWxTx
-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries information about the current nearby Wi-Fi networks
Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.
-
Queries the phone number (MSISDN for GSM devices)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Virtualization/Sandbox Evasion
2System Checks
2