General
-
Target
5f4de5cc0fa3e250a830289d8d4984d7_JaffaCakes118
-
Size
15.9MB
-
Sample
240520-qnh3cacb24
-
MD5
5f4de5cc0fa3e250a830289d8d4984d7
-
SHA1
c12e7a420fe06b9150fdaff5f0c8518188f142d4
-
SHA256
22819bef14ff445f8d63f10d163c6c8ffdd8a439be6f5c40a5229f90a5619f69
-
SHA512
0a0326ed5959b19b867a35307e116600a0ed9796409cf5e9bb1aa9be79141b6ef94b88b4cdebd7ee10ece2f6c927d700605d11dbfd95da6ce4463a2601132f04
-
SSDEEP
393216:ehr3cuI1V89GMrXglFci1WcvVXkSvkDBUdH:szZcMrQzciY47h
Static task
static1
Behavioral task
behavioral1
Sample
5f4de5cc0fa3e250a830289d8d4984d7_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
5f4de5cc0fa3e250a830289d8d4984d7_JaffaCakes118.apk
Resource
android-x64-20240514-en
Malware Config
Targets
-
-
Target
5f4de5cc0fa3e250a830289d8d4984d7_JaffaCakes118
-
Size
15.9MB
-
MD5
5f4de5cc0fa3e250a830289d8d4984d7
-
SHA1
c12e7a420fe06b9150fdaff5f0c8518188f142d4
-
SHA256
22819bef14ff445f8d63f10d163c6c8ffdd8a439be6f5c40a5229f90a5619f69
-
SHA512
0a0326ed5959b19b867a35307e116600a0ed9796409cf5e9bb1aa9be79141b6ef94b88b4cdebd7ee10ece2f6c927d700605d11dbfd95da6ce4463a2601132f04
-
SSDEEP
393216:ehr3cuI1V89GMrXglFci1WcvVXkSvkDBUdH:szZcMrQzciY47h
Score8/10-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries the phone number (MSISDN for GSM devices)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Virtualization/Sandbox Evasion
1System Checks
1