Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
7d53b2d5255a0fab1c685e7f988cac3e_JaffaCakes118
-
Size
12.3MB
-
Sample
240528-r1pw4ahb91
-
MD5
7d53b2d5255a0fab1c685e7f988cac3e
-
SHA1
d2da0e0b92190383406649ba04a7a4947f2586fc
-
SHA256
6f147d7da4a1a4595dd35774464741a00eddb3b5022c3cb794a059e1ab186f53
-
SHA512
8a3f7421ff32f210eb6824012ff0ee987670c731c5d5b8fcba75ba9e9abc4218614fd6581c9209607a5ec202493506f60717d4beddbdf3c322a280c5a3cc1fe4
-
SSDEEP
196608:Y5D26pDmV6zUKX2q5pqN+lqN2e9z7owedO/C4Mf4coMBpkhgaN+6L/706ddll9qb:2Hsq50WqlRlC4QBpMdT0slTKUTNuOi
Static task
static1
Behavioral task
behavioral1
Sample
7d53b2d5255a0fab1c685e7f988cac3e_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
7d53b2d5255a0fab1c685e7f988cac3e_JaffaCakes118.apk
Resource
android-x64-arm64-20240514-en
Malware Config
Targets
-
-
Target
7d53b2d5255a0fab1c685e7f988cac3e_JaffaCakes118
-
Size
12.3MB
-
MD5
7d53b2d5255a0fab1c685e7f988cac3e
-
SHA1
d2da0e0b92190383406649ba04a7a4947f2586fc
-
SHA256
6f147d7da4a1a4595dd35774464741a00eddb3b5022c3cb794a059e1ab186f53
-
SHA512
8a3f7421ff32f210eb6824012ff0ee987670c731c5d5b8fcba75ba9e9abc4218614fd6581c9209607a5ec202493506f60717d4beddbdf3c322a280c5a3cc1fe4
-
SSDEEP
196608:Y5D26pDmV6zUKX2q5pqN+lqN2e9z7owedO/C4Mf4coMBpkhgaN+6L/706ddll9qb:2Hsq50WqlRlC4QBpMdT0slTKUTNuOi
-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Reads information about phone network operator.
-
Schedules tasks to execute at a specified time
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Scheduled Task/Job
1Defense Evasion
Execution Guardrails
1Geofencing
1Virtualization/Sandbox Evasion
2System Checks
2