General
-
Target
65e2e9bffc2cd5f3e62b18b6449c9141_JaffaCakes118
-
Size
25.4MB
-
Sample
240522-d9hmgsba8v
-
MD5
65e2e9bffc2cd5f3e62b18b6449c9141
-
SHA1
98630c3bb3e168a0f7044e8c05764a3cedd94321
-
SHA256
7cead4fca3e6063f8fd7e5589e4ff9ee999c9aa89863db48c809c1c00dd13bff
-
SHA512
8560bd2a2c73400d980b4ae3ef956b9aeabba22122e86460abaaf6e5c610aeec99bfd35d0f3f17dcd986b868c60b015394d136dd3aa01299deb867a4dee6d6e1
-
SSDEEP
786432:qIQsTc7pSfUrzBeIvs9zvYxDmPytlE4parjz2jkHC:91wJr1eqOuDmJJHnHC
Static task
static1
Behavioral task
behavioral1
Sample
65e2e9bffc2cd5f3e62b18b6449c9141_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
65e2e9bffc2cd5f3e62b18b6449c9141_JaffaCakes118
-
Size
25.4MB
-
MD5
65e2e9bffc2cd5f3e62b18b6449c9141
-
SHA1
98630c3bb3e168a0f7044e8c05764a3cedd94321
-
SHA256
7cead4fca3e6063f8fd7e5589e4ff9ee999c9aa89863db48c809c1c00dd13bff
-
SHA512
8560bd2a2c73400d980b4ae3ef956b9aeabba22122e86460abaaf6e5c610aeec99bfd35d0f3f17dcd986b868c60b015394d136dd3aa01299deb867a4dee6d6e1
-
SSDEEP
786432:qIQsTc7pSfUrzBeIvs9zvYxDmPytlE4parjz2jkHC:91wJr1eqOuDmJJHnHC
Score8/10-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Checks if the internet connection is available
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-
MITRE ATT&CK Mobile v15
Defense Evasion
Execution Guardrails
1Geofencing
1Virtualization/Sandbox Evasion
1System Checks
1