General
-
Target
6b8b91b7963bca247a9200f938275c38_JaffaCakes118
-
Size
6.1MB
-
Sample
240523-tw9rtahb58
-
MD5
6b8b91b7963bca247a9200f938275c38
-
SHA1
ec18222197774051013a5dd848f3acdafce6cf3f
-
SHA256
75b66f0b62efd1bbd3fa88ed037735b87c1b14dd3edafbc6c57f8e914f5caaef
-
SHA512
96d4db21ca9416b90087465d55859d2601a8b656fd052cd140451155e2575712c437e442d5a6044538f59042bdc2785776965f6df7b1523abd7701865db0837a
-
SSDEEP
98304:g8CdrTLh4pUcxh7EMEjzeFsX1wh5AfL+sqG8+fPQQ8/5DeRMNryAiRgqU2XybWxz:9bhozeFj5abv3C98X1XyGf0K3
Static task
static1
Behavioral task
behavioral1
Sample
6b8b91b7963bca247a9200f938275c38_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
6b8b91b7963bca247a9200f938275c38_JaffaCakes118.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral3
Sample
6b8b91b7963bca247a9200f938275c38_JaffaCakes118.apk
Resource
android-x64-arm64-20240514-en
Malware Config
Targets
-
-
Target
6b8b91b7963bca247a9200f938275c38_JaffaCakes118
-
Size
6.1MB
-
MD5
6b8b91b7963bca247a9200f938275c38
-
SHA1
ec18222197774051013a5dd848f3acdafce6cf3f
-
SHA256
75b66f0b62efd1bbd3fa88ed037735b87c1b14dd3edafbc6c57f8e914f5caaef
-
SHA512
96d4db21ca9416b90087465d55859d2601a8b656fd052cd140451155e2575712c437e442d5a6044538f59042bdc2785776965f6df7b1523abd7701865db0837a
-
SSDEEP
98304:g8CdrTLh4pUcxh7EMEjzeFsX1wh5AfL+sqG8+fPQQ8/5DeRMNryAiRgqU2XybWxz:9bhozeFj5abv3C98X1XyGf0K3
-
Checks if the Android device is rooted.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Acquires the wake lock
-
Checks if the internet connection is available
-
Reads information about phone network operator.
-
Schedules tasks to execute at a specified time
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Scheduled Task/Job
1Defense Evasion
Hide Artifacts
1Suppress Application Icon
1Virtualization/Sandbox Evasion
2System Checks
2