General
-
Target
619699bc05aa8c38d67eaf6dde54571b_JaffaCakes118
-
Size
7.3MB
-
Sample
240521-bqafnadh81
-
MD5
619699bc05aa8c38d67eaf6dde54571b
-
SHA1
4f614036e8c53016a0f8cab8b4043298b7c5f334
-
SHA256
b388990fde8dcfcde731b3188e59975d3c1f51f2f6678a23a4935259681018f4
-
SHA512
f520b30d2a3ca731cf4c69ad68411bd9a49f418482322303e72b05b6f4301f76cfae3098308b9c0ee8a8c5791b12df3026fa4745091626916dcd0885d384cee8
-
SSDEEP
98304:/vu7EUpGuvGuOWqe4gImR7lvDb+i3lyCkori+cGQxaTO:/WQU0Cqe4l+pvDbUCk9+cOi
Static task
static1
Behavioral task
behavioral1
Sample
619699bc05aa8c38d67eaf6dde54571b_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
619699bc05aa8c38d67eaf6dde54571b_JaffaCakes118.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral3
Sample
619699bc05aa8c38d67eaf6dde54571b_JaffaCakes118.apk
Resource
android-x64-arm64-20240514-en
Malware Config
Targets
-
-
Target
619699bc05aa8c38d67eaf6dde54571b_JaffaCakes118
-
Size
7.3MB
-
MD5
619699bc05aa8c38d67eaf6dde54571b
-
SHA1
4f614036e8c53016a0f8cab8b4043298b7c5f334
-
SHA256
b388990fde8dcfcde731b3188e59975d3c1f51f2f6678a23a4935259681018f4
-
SHA512
f520b30d2a3ca731cf4c69ad68411bd9a49f418482322303e72b05b6f4301f76cfae3098308b9c0ee8a8c5791b12df3026fa4745091626916dcd0885d384cee8
-
SSDEEP
98304:/vu7EUpGuvGuOWqe4gImR7lvDb+i3lyCkori+cGQxaTO:/WQU0Cqe4l+pvDbUCk9+cOi
-
Checks if the Android device is rooted.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Checks the presence of a debugger
-
Listens for changes in the sensor environment (might be used to detect emulation)
-
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Virtualization/Sandbox Evasion
2System Checks
2