General
-
Target
637c29454b3815ce96f568c2ff19f7d7_JaffaCakes118
-
Size
6.6MB
-
Sample
240521-qy2x7sfh48
-
MD5
637c29454b3815ce96f568c2ff19f7d7
-
SHA1
da88ffb22bbea14ce0f1b0812f411a5d31ad9d2f
-
SHA256
7a16d64d715166dfa4a9a899cd7884ae9e17f7a8c1cc236c3a54adcafa09d4a1
-
SHA512
13475213ec9257ce3e2aa1d86843feb429965edd48f1a40cb82332c27770384984e20bc91db53e72551d341f3adf92b2556cfecf0504b629393775c2385c7e2c
-
SSDEEP
196608:QIk6AIxJ6OI68urDq7SQU7QAHc3HGhZSMcFvSqvUT/bhZa:Q4NJq6fJp7Q73mhZ/bTfa
Static task
static1
Behavioral task
behavioral1
Sample
637c29454b3815ce96f568c2ff19f7d7_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
sdk.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral3
Sample
sdk.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral4
Sample
sdk.apk
Resource
android-x64-arm64-20240514-en
Malware Config
Targets
-
-
Target
637c29454b3815ce96f568c2ff19f7d7_JaffaCakes118
-
Size
6.6MB
-
MD5
637c29454b3815ce96f568c2ff19f7d7
-
SHA1
da88ffb22bbea14ce0f1b0812f411a5d31ad9d2f
-
SHA256
7a16d64d715166dfa4a9a899cd7884ae9e17f7a8c1cc236c3a54adcafa09d4a1
-
SHA512
13475213ec9257ce3e2aa1d86843feb429965edd48f1a40cb82332c27770384984e20bc91db53e72551d341f3adf92b2556cfecf0504b629393775c2385c7e2c
-
SSDEEP
196608:QIk6AIxJ6OI68urDq7SQU7QAHc3HGhZSMcFvSqvUT/bhZa:Q4NJq6fJp7Q73mhZ/bTfa
-
Checks if the Android device is rooted.
-
Checks known Qemu files.
Checks for known Qemu files that exist on Android virtual device images.
-
Checks known Qemu pipes.
Checks for known pipes used by the Android emulator to communicate with the host.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Reads information about phone network operator.
-
Schedules tasks to execute at a specified time
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
-
-
-
Target
sdk.jar
-
Size
158KB
-
MD5
d440d29973a4652bd33f145221ad6aec
-
SHA1
a6883bfa17a19d266b67de42c243de503d5be2f5
-
SHA256
61a9767c427e8b2eea2421ee1f3541aa6735302d549b2eda02ab718994f70bcb
-
SHA512
9fbfbbadc9ab71c38d001a1c3db081a7f3d2568d650409c9daa8f626ea45a66f1d02fe0f52e8edcf430a79ba4e49f3102d91c6dfbbf599449edc958734325645
-
SSDEEP
3072:wgbYL1U5ewMbpPsPVcocB4Q1XLKbPgv1x8cLrBKtzdefKLk0AJ1:wg8LCeDbpPstcocSNPWxrQje0k1
Score1/10 -
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Virtualization/Sandbox Evasion
4System Checks
4