General
-
Target
696acdf4d4b9d7a79de1f8522a466bed_JaffaCakes118
-
Size
307KB
-
Sample
240523-cqh88sad76
-
MD5
696acdf4d4b9d7a79de1f8522a466bed
-
SHA1
1202ab7d8a6a4a9f5f74a3e7c992b0d53d1fd72a
-
SHA256
f7dcea67f15ed1a461dea73515e7ecd467e86901da7b72280aa23396aee76d98
-
SHA512
bc840a616b288695ff0a05045195bc669cd0c60968c3b632e709d2319f771f98ae5c4773f676112a1c5e04fea2dcb645ea9b550bc478604232732ab6ffb9b00b
-
SSDEEP
6144:V1UFRQ98qOm76nUgUHuzie9rx4g66zG6uPPJ2Jfo2Cd8IHcDi+NSYIS6tODNafj+:V4Q98zqcUgxr91qUACmcDi+AtoNQI
Static task
static1
Behavioral task
behavioral1
Sample
696acdf4d4b9d7a79de1f8522a466bed_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
696acdf4d4b9d7a79de1f8522a466bed_JaffaCakes118.apk
Resource
android-x64-20240514-en
Malware Config
Targets
-
-
Target
696acdf4d4b9d7a79de1f8522a466bed_JaffaCakes118
-
Size
307KB
-
MD5
696acdf4d4b9d7a79de1f8522a466bed
-
SHA1
1202ab7d8a6a4a9f5f74a3e7c992b0d53d1fd72a
-
SHA256
f7dcea67f15ed1a461dea73515e7ecd467e86901da7b72280aa23396aee76d98
-
SHA512
bc840a616b288695ff0a05045195bc669cd0c60968c3b632e709d2319f771f98ae5c4773f676112a1c5e04fea2dcb645ea9b550bc478604232732ab6ffb9b00b
-
SSDEEP
6144:V1UFRQ98qOm76nUgUHuzie9rx4g66zG6uPPJ2Jfo2Cd8IHcDi+NSYIS6tODNafj+:V4Q98zqcUgxr91qUACmcDi+AtoNQI
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries the phone number (MSISDN for GSM devices)
-
Tries to add a device administrator.
-
Checks if the internet connection is available
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-
MITRE ATT&CK Mobile v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Device Administrator Permissions
1Defense Evasion
Download New Code at Runtime
1Hide Artifacts
1Suppress Application Icon
1