General
-
Target
6af7a1ddb78a989a8d87833192728ace_JaffaCakes118
-
Size
3.0MB
-
Sample
240523-pva5msad37
-
MD5
6af7a1ddb78a989a8d87833192728ace
-
SHA1
45e383e17d3291a8fa80bc801381f6403e5e2dc4
-
SHA256
1437e87926ccf615008ba163cbee43e749f5731da2f153920f3fb14e5b607506
-
SHA512
96df5ad30edd3f44b14f3b6376bb07ec54e0740eff092eb393bdd8f717179d37d3b7fe4b3ed03b59fb875b008e09b2f7a8af708feef1bb3b43cddb76004ffb82
-
SSDEEP
98304:b/IXp73lyCxvEyibGb9u9MIzpWR3QTAM+ej:+3ly0ErGboUR3QkM+ej
Static task
static1
Behavioral task
behavioral1
Sample
6af7a1ddb78a989a8d87833192728ace_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
6af7a1ddb78a989a8d87833192728ace_JaffaCakes118
-
Size
3.0MB
-
MD5
6af7a1ddb78a989a8d87833192728ace
-
SHA1
45e383e17d3291a8fa80bc801381f6403e5e2dc4
-
SHA256
1437e87926ccf615008ba163cbee43e749f5731da2f153920f3fb14e5b607506
-
SHA512
96df5ad30edd3f44b14f3b6376bb07ec54e0740eff092eb393bdd8f717179d37d3b7fe4b3ed03b59fb875b008e09b2f7a8af708feef1bb3b43cddb76004ffb82
-
SSDEEP
98304:b/IXp73lyCxvEyibGb9u9MIzpWR3QTAM+ej:+3ly0ErGboUR3QkM+ej
-
Checks if the Android device is rooted.
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Acquires the wake lock
-
Checks if the internet connection is available
-
MITRE ATT&CK Mobile v15
Defense Evasion
Input Injection
1Virtualization/Sandbox Evasion
1System Checks
1Discovery
Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
1System Network Connections Discovery
2