General
-
Target
647694575eb420c799639f502eb2ac71_JaffaCakes118
-
Size
10.2MB
-
Sample
240521-x11aqafg4z
-
MD5
647694575eb420c799639f502eb2ac71
-
SHA1
b15e793d63b99599b35a94f5a3a696387d47c0d9
-
SHA256
dfc4bc83db325da8c41a92e619e2f8a8c9466699bf161031e9bfbedb311e3896
-
SHA512
b5dbed4d373bcdd1007f603c5b505c027f177c4752eafc8c1a05ee1881ec5591c781065b1cef7d2c318cd07c03047c3c8efd310072b38816c4305bebea6ac94a
-
SSDEEP
196608:m1GKXyqYm8SXd2RRdDOE+g1no5j8EL71qfp1fh+pHLh:wXT/mRRUviaLL7gPfh+rh
Static task
static1
Behavioral task
behavioral1
Sample
647694575eb420c799639f502eb2ac71_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
647694575eb420c799639f502eb2ac71_JaffaCakes118.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral3
Sample
647694575eb420c799639f502eb2ac71_JaffaCakes118.apk
Resource
android-x64-arm64-20240514-en
Malware Config
Targets
-
-
Target
647694575eb420c799639f502eb2ac71_JaffaCakes118
-
Size
10.2MB
-
MD5
647694575eb420c799639f502eb2ac71
-
SHA1
b15e793d63b99599b35a94f5a3a696387d47c0d9
-
SHA256
dfc4bc83db325da8c41a92e619e2f8a8c9466699bf161031e9bfbedb311e3896
-
SHA512
b5dbed4d373bcdd1007f603c5b505c027f177c4752eafc8c1a05ee1881ec5591c781065b1cef7d2c318cd07c03047c3c8efd310072b38816c4305bebea6ac94a
-
SSDEEP
196608:m1GKXyqYm8SXd2RRdDOE+g1no5j8EL71qfp1fh+pHLh:wXT/mRRUviaLL7gPfh+rh
-
Checks if the Android device is rooted.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Reads information about phone network operator.
-
Checks the presence of a debugger
-
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Virtualization/Sandbox Evasion
2System Checks
2