General
-
Target
712b4eff09ae251587616e0e143435f1_JaffaCakes118
-
Size
3.4MB
-
Sample
240525-hlan7ahg96
-
MD5
712b4eff09ae251587616e0e143435f1
-
SHA1
5e101106ff65d46367c6e380885cb7bc560c3858
-
SHA256
15259758b346f1b5a9bfc102f939b3631bdaf9372fa5abfb7a750d9245eada9a
-
SHA512
246871770310d4a862b7d6caf79b016f5068a4b3b6b13c2ef72b0e6c516c19996612cc410733118ac9575530dc61071ae7ab3e45d0b0fb7a48e25939b2a85343
-
SSDEEP
98304:d1UJIzyTs1tiTD5b3VNUkLE9h62RPcFwTTZlv1zz4TR:dUlnUkQ9s2R0FwTTZXzu
Static task
static1
Behavioral task
behavioral1
Sample
712b4eff09ae251587616e0e143435f1_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
712b4eff09ae251587616e0e143435f1_JaffaCakes118.apk
Resource
android-33-x64-arm64-20240514-en
Malware Config
Targets
-
-
Target
712b4eff09ae251587616e0e143435f1_JaffaCakes118
-
Size
3.4MB
-
MD5
712b4eff09ae251587616e0e143435f1
-
SHA1
5e101106ff65d46367c6e380885cb7bc560c3858
-
SHA256
15259758b346f1b5a9bfc102f939b3631bdaf9372fa5abfb7a750d9245eada9a
-
SHA512
246871770310d4a862b7d6caf79b016f5068a4b3b6b13c2ef72b0e6c516c19996612cc410733118ac9575530dc61071ae7ab3e45d0b0fb7a48e25939b2a85343
-
SSDEEP
98304:d1UJIzyTs1tiTD5b3VNUkLE9h62RPcFwTTZlv1zz4TR:dUlnUkQ9s2R0FwTTZXzu
-
Checks if the Android device is rooted.
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Reads information about phone network operator.
-