General
-
Target
68d9c5fd69f0c4c00851a5f4ab2c509f_JaffaCakes118
-
Size
17.0MB
-
Sample
240522-2dpb6abd57
-
MD5
68d9c5fd69f0c4c00851a5f4ab2c509f
-
SHA1
90a5195c0b499fa3083288cd2778c7db2e183bfb
-
SHA256
608fea5151526866ebb91b8a7dbe98ae5d02157462e3ac73bbdcb03235fb4fe4
-
SHA512
8539f33fc684d5fbdcb72abe755cb9e95e74d179ee4dea02baf9bc0c36f253c7744aa9fe78bf70ed2157a921e1ef1a54dd60f8ff2aea16ac624b53049f57d4eb
-
SSDEEP
393216:W0AVAKmSiBurO38NNaS0HjX8+t9GJ9khfjjuTc54eq0B/jd3o:FAVAKPauXHhsXJPMwfj4C4z0B/q
Static task
static1
Behavioral task
behavioral1
Sample
68d9c5fd69f0c4c00851a5f4ab2c509f_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
68d9c5fd69f0c4c00851a5f4ab2c509f_JaffaCakes118.apk
Resource
android-x64-20240514-en
Malware Config
Targets
-
-
Target
68d9c5fd69f0c4c00851a5f4ab2c509f_JaffaCakes118
-
Size
17.0MB
-
MD5
68d9c5fd69f0c4c00851a5f4ab2c509f
-
SHA1
90a5195c0b499fa3083288cd2778c7db2e183bfb
-
SHA256
608fea5151526866ebb91b8a7dbe98ae5d02157462e3ac73bbdcb03235fb4fe4
-
SHA512
8539f33fc684d5fbdcb72abe755cb9e95e74d179ee4dea02baf9bc0c36f253c7744aa9fe78bf70ed2157a921e1ef1a54dd60f8ff2aea16ac624b53049f57d4eb
-
SSDEEP
393216:W0AVAKmSiBurO38NNaS0HjX8+t9GJ9khfjjuTc54eq0B/jd3o:FAVAKPauXHhsXJPMwfj4C4z0B/q
Score8/10-
Checks if the Android device is rooted.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-
Checks the presence of a debugger
-
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Virtualization/Sandbox Evasion
2System Checks
2