General
-
Target
6b2bc63e15d794825bbcc29482955cb2_JaffaCakes118
-
Size
16.8MB
-
Sample
240523-rbmqfade4y
-
MD5
6b2bc63e15d794825bbcc29482955cb2
-
SHA1
98b730dbe88936c1397a797e7ed699b6ab2a9197
-
SHA256
28b36398f071c82b0ff07dbdc4e4e45d4db2e0cd7eeabbfdc8d55b438693f813
-
SHA512
42930235b0a27f242ade79dec207591f36418a18af1b3d43866b5a77224e64e810001507957e17e187dbc15e2f55d53d4ab2b46aa3a69fb92a0e79667fac16ed
-
SSDEEP
393216:PbGuYQcvy8VWMfZ6ePR0QTyLscLnFYh8hnt5jbbMgdjyLXJq:PbddcvtVWRe50QTyLscqh8JjbYqs5q
Static task
static1
Behavioral task
behavioral1
Sample
6b2bc63e15d794825bbcc29482955cb2_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
6b2bc63e15d794825bbcc29482955cb2_JaffaCakes118
-
Size
16.8MB
-
MD5
6b2bc63e15d794825bbcc29482955cb2
-
SHA1
98b730dbe88936c1397a797e7ed699b6ab2a9197
-
SHA256
28b36398f071c82b0ff07dbdc4e4e45d4db2e0cd7eeabbfdc8d55b438693f813
-
SHA512
42930235b0a27f242ade79dec207591f36418a18af1b3d43866b5a77224e64e810001507957e17e187dbc15e2f55d53d4ab2b46aa3a69fb92a0e79667fac16ed
-
SSDEEP
393216:PbGuYQcvy8VWMfZ6ePR0QTyLscLnFYh8hnt5jbbMgdjyLXJq:PbddcvtVWRe50QTyLscqh8JjbYqs5q
Score8/10-
Checks if the Android device is rooted.
-
Checks Android system properties for emulator presence.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Acquires the wake lock
-
Checks if the internet connection is available
-
Reads information about phone network operator.
-
Checks the presence of a debugger
-
Listens for changes in the sensor environment (might be used to detect emulation)
-
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Hide Artifacts
1User Evasion
1Virtualization/Sandbox Evasion
3System Checks
3