General
-
Target
5e05bd354281278f8b0a4b015737b4cc_JaffaCakes118
-
Size
10.1MB
-
Sample
240520-j1wqmsbf8t
-
MD5
5e05bd354281278f8b0a4b015737b4cc
-
SHA1
74d87ba465a08ae71abf3762c32823d2e006d0d4
-
SHA256
790f7b0562a93f7c847e22a9d36c006d39492b8e4734090a2a0ff9142e6be43c
-
SHA512
81331b31504542ef178821bda0f577f3b2607bccd1bfd847f708682a069af2d1e395bf25a04c072a2b53d8e8e02c778ff304e2a869f8b1ad460b975340deb05a
-
SSDEEP
196608:NrDp+a1BKMmYcdVWagViKvNx50Vuh6WSXOYKmZ7UTDR4swfPB5YRT:NXcarK19vPgViYN+uhhSX/KwIDRsfvgT
Static task
static1
Behavioral task
behavioral1
Sample
5e05bd354281278f8b0a4b015737b4cc_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
5e05bd354281278f8b0a4b015737b4cc_JaffaCakes118
-
Size
10.1MB
-
MD5
5e05bd354281278f8b0a4b015737b4cc
-
SHA1
74d87ba465a08ae71abf3762c32823d2e006d0d4
-
SHA256
790f7b0562a93f7c847e22a9d36c006d39492b8e4734090a2a0ff9142e6be43c
-
SHA512
81331b31504542ef178821bda0f577f3b2607bccd1bfd847f708682a069af2d1e395bf25a04c072a2b53d8e8e02c778ff304e2a869f8b1ad460b975340deb05a
-
SSDEEP
196608:NrDp+a1BKMmYcdVWagViKvNx50Vuh6WSXOYKmZ7UTDR4swfPB5YRT:NXcarK19vPgViYN+uhhSX/KwIDRsfvgT
-
Checks if the Android device is rooted.
-
Checks known Qemu files.
Checks for known Qemu files that exist on Android virtual device images.
-
Checks known Qemu pipes.
Checks for known pipes used by the Android emulator to communicate with the host.
-
Queries account information for other applications stored on the device
Application may abuse the framework's APIs to collect account information stored on the device.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Reads information about phone network operator.
-
Schedules tasks to execute at a specified time
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Virtualization/Sandbox Evasion
4System Checks
4