General
-
Target
69bb28f1a2167e4583477f82b3f7f428_JaffaCakes118
-
Size
14.2MB
-
Sample
240523-e6gfpaea43
-
MD5
69bb28f1a2167e4583477f82b3f7f428
-
SHA1
1bb32155d5c45afdf8102bfcd6ccd3545704cf19
-
SHA256
1c4b4b94bcdfdebdbaa722871243d96a9e5baa37755e60083fc57f7fc36ce02d
-
SHA512
7c6861f2311c5b1b761b323a8fce24e252bf09f774e27188922698457ff8fbbccbebf667dbbc835f566e4713fc48e28a519a69efdd994a6c5e3a4c6ca97dd69d
-
SSDEEP
393216:9+yOxqaHNi3cPwYJr5GYCsbgJ8gecZd/b0ebmYWrYhB7:UHA3cYorIFwebR+Kd
Static task
static1
Behavioral task
behavioral1
Sample
69bb28f1a2167e4583477f82b3f7f428_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
69bb28f1a2167e4583477f82b3f7f428_JaffaCakes118
-
Size
14.2MB
-
MD5
69bb28f1a2167e4583477f82b3f7f428
-
SHA1
1bb32155d5c45afdf8102bfcd6ccd3545704cf19
-
SHA256
1c4b4b94bcdfdebdbaa722871243d96a9e5baa37755e60083fc57f7fc36ce02d
-
SHA512
7c6861f2311c5b1b761b323a8fce24e252bf09f774e27188922698457ff8fbbccbebf667dbbc835f566e4713fc48e28a519a69efdd994a6c5e3a4c6ca97dd69d
-
SSDEEP
393216:9+yOxqaHNi3cPwYJr5GYCsbgJ8gecZd/b0ebmYWrYhB7:UHA3cYorIFwebR+Kd
-
Queries account information for other applications stored on the device
Application may abuse the framework's APIs to collect account information stored on the device.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Listens for changes in the sensor environment (might be used to detect emulation)
-
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Hide Artifacts
1User Evasion
1Virtualization/Sandbox Evasion
1System Checks
1