General
-
Target
65d62b4677d6c5892a3f7ad4d1a80968_JaffaCakes118
-
Size
15.8MB
-
Sample
240522-dw4b2aae69
-
MD5
65d62b4677d6c5892a3f7ad4d1a80968
-
SHA1
50c7fe6c444da0d5383d206ddef06bc66a1952e3
-
SHA256
5a8e2df62e7931f08b291aa7869671441a0f28b75e35717f5f8ef5a374195122
-
SHA512
cfd639cfb8321f3eedb14745835a68075399044980cc13b88d2328c0117e07f92202c9492be79cb74986997dcf36fb829797dafbb4b536c093837fabb21167ed
-
SSDEEP
393216:178XKMmXKxZa1USQWjKdvvnbVzzljvA3F6J6wkIcYEB3SsZmi8N:17hKemWjKFVzz9vAq6hYEB3SsZmi8N
Static task
static1
Behavioral task
behavioral1
Sample
65d62b4677d6c5892a3f7ad4d1a80968_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
65d62b4677d6c5892a3f7ad4d1a80968_JaffaCakes118.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral3
Sample
plugin-deploy.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral4
Sample
plugin-deploy.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral5
Sample
plugin-deploy.apk
Resource
android-x64-arm64-20240514-en
Malware Config
Targets
-
-
Target
65d62b4677d6c5892a3f7ad4d1a80968_JaffaCakes118
-
Size
15.8MB
-
MD5
65d62b4677d6c5892a3f7ad4d1a80968
-
SHA1
50c7fe6c444da0d5383d206ddef06bc66a1952e3
-
SHA256
5a8e2df62e7931f08b291aa7869671441a0f28b75e35717f5f8ef5a374195122
-
SHA512
cfd639cfb8321f3eedb14745835a68075399044980cc13b88d2328c0117e07f92202c9492be79cb74986997dcf36fb829797dafbb4b536c093837fabb21167ed
-
SSDEEP
393216:178XKMmXKxZa1USQWjKdvvnbVzzljvA3F6J6wkIcYEB3SsZmi8N:17hKemWjKFVzz9vAq6hYEB3SsZmi8N
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-
-
-
Target
plugin-deploy.jar
-
Size
206KB
-
MD5
02fe22caeb17a9d7c7f5c3914e3cda29
-
SHA1
7e3293216263ab967ca6e9a3c55ba589444e3de7
-
SHA256
0fba8eedb44faf95448ed7e25bcba48b49aa981e1e1e154fcbd90e48447813a4
-
SHA512
020324dd3b38d6d75fbb54f18caf0bfdff38e27b0c18aa83989b53e9da96a6d6c780f281b21da8f1b41e3de1206306954dc9d1e42aa2dd12f500b66e04f4c647
-
SSDEEP
6144:QVMQdIey/0Jl8L9umLtnWy6C0mNiEfWBm63:QVMbL/q2nL4g0mNXf7o
Score1/10 -
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Virtualization/Sandbox Evasion
2System Checks
2