General
-
Target
58fb5b58c0a4abd717a52debbc4fd117_JaffaCakes118
-
Size
19.1MB
-
Sample
240519-g6hpvsed48
-
MD5
58fb5b58c0a4abd717a52debbc4fd117
-
SHA1
21fcd420f183275a9d82748057f18df42a0dc80c
-
SHA256
8d31255b638e531065206f1a8d87db546db8c690b77a34c20bd9d53effd57401
-
SHA512
67c0460090eaf9a5f092c8dcca2e83c4f8dfba08589d4ed1a4bb7a81e2c7b7b7a7afb34834713aa65e1e4803001a752dd4f93026609235288076fd47ee602e5b
-
SSDEEP
393216:B3e3eeR13mnW4JXkmt66oMNeQ+GVHGERodkGAJ4XSe4YCgopRuSh:Bu3eKknW4JUt6bNRHV6dwJ4XSe4fgouA
Static task
static1
Behavioral task
behavioral1
Sample
58fb5b58c0a4abd717a52debbc4fd117_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
58fb5b58c0a4abd717a52debbc4fd117_JaffaCakes118
-
Size
19.1MB
-
MD5
58fb5b58c0a4abd717a52debbc4fd117
-
SHA1
21fcd420f183275a9d82748057f18df42a0dc80c
-
SHA256
8d31255b638e531065206f1a8d87db546db8c690b77a34c20bd9d53effd57401
-
SHA512
67c0460090eaf9a5f092c8dcca2e83c4f8dfba08589d4ed1a4bb7a81e2c7b7b7a7afb34834713aa65e1e4803001a752dd4f93026609235288076fd47ee602e5b
-
SSDEEP
393216:B3e3eeR13mnW4JXkmt66oMNeQ+GVHGERodkGAJ4XSe4YCgopRuSh:Bu3eKknW4JUt6bNRHV6dwJ4XSe4fgouA
Score8/10-
Checks if the Android device is rooted.
-
Checks Android system properties for emulator presence.
-
Checks known Qemu files.
Checks for known Qemu files that exist on Android virtual device images.
-
Checks known Qemu pipes.
Checks for known pipes used by the Android emulator to communicate with the host.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Virtualization/Sandbox Evasion
5System Checks
5