General
-
Target
6e04d2fb13d46982594286ba40d7ea46_JaffaCakes118
-
Size
31.0MB
-
Sample
240524-k98x1acd56
-
MD5
6e04d2fb13d46982594286ba40d7ea46
-
SHA1
56a4e4625652c287378c72c024465004be5623b7
-
SHA256
6964f35cbaf86ffdd4109f3fcac43c669eedfffa060ced6c2ad109418e970a46
-
SHA512
a4468a2d927a66924c324eef4451732e19b6129685b345fe8249cc7f0aa106d8193d9544f7868ae6e8d0d4381ce6759ce06d473fa261c35890d658a7e69a66b0
-
SSDEEP
393216:tmtlByGkvQ/tVW+S7fQOyEO+oLjKgUsOjpW8gmj2qDFo/DDTFtm+45aekR6wxpY1:tmtDyF+IR7fQOXdTVW8rMDWGekR3xpw
Static task
static1
Behavioral task
behavioral1
Sample
6e04d2fb13d46982594286ba40d7ea46_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
6e04d2fb13d46982594286ba40d7ea46_JaffaCakes118
-
Size
31.0MB
-
MD5
6e04d2fb13d46982594286ba40d7ea46
-
SHA1
56a4e4625652c287378c72c024465004be5623b7
-
SHA256
6964f35cbaf86ffdd4109f3fcac43c669eedfffa060ced6c2ad109418e970a46
-
SHA512
a4468a2d927a66924c324eef4451732e19b6129685b345fe8249cc7f0aa106d8193d9544f7868ae6e8d0d4381ce6759ce06d473fa261c35890d658a7e69a66b0
-
SSDEEP
393216:tmtlByGkvQ/tVW+S7fQOyEO+oLjKgUsOjpW8gmj2qDFo/DDTFtm+45aekR6wxpY1:tmtDyF+IR7fQOXdTVW8rMDWGekR3xpw
-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Acquires the wake lock
-
Checks if the internet connection is available
-
Reads information about phone network operator.
-
MITRE ATT&CK Mobile v15
Defense Evasion
Execution Guardrails
1Geofencing
1Virtualization/Sandbox Evasion
2System Checks
2