General
-
Target
61e980a310a4e6df667681379c218df8_JaffaCakes118
-
Size
14.6MB
-
Sample
240521-d7txqsgc43
-
MD5
61e980a310a4e6df667681379c218df8
-
SHA1
43ef9598b930736d34de617ad416d9acb2219c0f
-
SHA256
e36e236e1f4fdd65157d36b082898304adc9cf5ea428592ed56c9c71088f5e07
-
SHA512
4078e5937919cb79a799d251949e9a009cdcf5be1f7358192e3ce850d13856737cf8cb129ce39d96cf1a2effe38b92160c7802c51d1e101f81257375abd4bd2a
-
SSDEEP
393216:gg1RNZpgOP0sn7BIwBKBq3jLbr8ey0yiT9uG+IF0cg:hjgkNCqzLbrby6hBpg
Static task
static1
Behavioral task
behavioral1
Sample
61e980a310a4e6df667681379c218df8_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
61e980a310a4e6df667681379c218df8_JaffaCakes118
-
Size
14.6MB
-
MD5
61e980a310a4e6df667681379c218df8
-
SHA1
43ef9598b930736d34de617ad416d9acb2219c0f
-
SHA256
e36e236e1f4fdd65157d36b082898304adc9cf5ea428592ed56c9c71088f5e07
-
SHA512
4078e5937919cb79a799d251949e9a009cdcf5be1f7358192e3ce850d13856737cf8cb129ce39d96cf1a2effe38b92160c7802c51d1e101f81257375abd4bd2a
-
SSDEEP
393216:gg1RNZpgOP0sn7BIwBKBq3jLbr8ey0yiT9uG+IF0cg:hjgkNCqzLbrby6hBpg
Score8/10-
Checks if the Android device is rooted.
-
Checks Android system properties for emulator presence.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Reads information about phone network operator.
-
MITRE ATT&CK Mobile v15
Defense Evasion
Execution Guardrails
1Geofencing
1Virtualization/Sandbox Evasion
3System Checks
3