General
-
Target
690fca83c6f52f3940b25d8caaffb5b7_JaffaCakes118
-
Size
30.4MB
-
Sample
240522-3xm4wadh95
-
MD5
690fca83c6f52f3940b25d8caaffb5b7
-
SHA1
324142858e984685ae1185bdf625379e349e2107
-
SHA256
e0eefd7fb3bf420eee851083e47dbbefd59328fa4225cb535d65bad4dc308590
-
SHA512
a24a8a7b5ca654ff084b06436ff918f2df4676cd3a85566f14faed7190476204e9fe539c8e9f9bec3213256fb357723b80045f3bf35fd64428b9d8183e275528
-
SSDEEP
786432:pReajCEA8deK5ZHVfPY3cqPo6MJ4UI4sH1FPPA6StJwzieo+3/Xf:Teaj/Ay57PY3nWJ4UI44iGG9+vv
Static task
static1
Behavioral task
behavioral1
Sample
690fca83c6f52f3940b25d8caaffb5b7_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
690fca83c6f52f3940b25d8caaffb5b7_JaffaCakes118
-
Size
30.4MB
-
MD5
690fca83c6f52f3940b25d8caaffb5b7
-
SHA1
324142858e984685ae1185bdf625379e349e2107
-
SHA256
e0eefd7fb3bf420eee851083e47dbbefd59328fa4225cb535d65bad4dc308590
-
SHA512
a24a8a7b5ca654ff084b06436ff918f2df4676cd3a85566f14faed7190476204e9fe539c8e9f9bec3213256fb357723b80045f3bf35fd64428b9d8183e275528
-
SSDEEP
786432:pReajCEA8deK5ZHVfPY3cqPo6MJ4UI4sH1FPPA6StJwzieo+3/Xf:Teaj/Ay57PY3nWJ4UI44iGG9+vv
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries information about the current nearby Wi-Fi networks
Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.
-
Queries the phone number (MSISDN for GSM devices)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Reads information about phone network operator.
-
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Virtualization/Sandbox Evasion
2System Checks
2