General
-
Target
7fc18e1f00409938bc6170f79e004426_JaffaCakes118
-
Size
5.3MB
-
Sample
240529-gzrdesdh22
-
MD5
7fc18e1f00409938bc6170f79e004426
-
SHA1
38dcd49e605a0e9ba74b72e0154e863bc7eade81
-
SHA256
2a392c8a0b7c7dcf934e610433b8c67634695aa54c5d08438ad48026cb54ebfa
-
SHA512
2ade6279225be3e48f24a996655c647854996d0ea7f2fd131f95527746ac6119332bb33b69f516b26b7d30d56d70301ae61a5fe9134c8ca68a7b213701301a01
-
SSDEEP
98304:L3rFsb0LtjiJ7YjWQg3UYOlQ2561e5T222222qt2NUaXTWk+PNQS:L32g5YYj+UYx1eutyUaDN+f
Static task
static1
Behavioral task
behavioral1
Sample
7fc18e1f00409938bc6170f79e004426_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
7fc18e1f00409938bc6170f79e004426_JaffaCakes118
-
Size
5.3MB
-
MD5
7fc18e1f00409938bc6170f79e004426
-
SHA1
38dcd49e605a0e9ba74b72e0154e863bc7eade81
-
SHA256
2a392c8a0b7c7dcf934e610433b8c67634695aa54c5d08438ad48026cb54ebfa
-
SHA512
2ade6279225be3e48f24a996655c647854996d0ea7f2fd131f95527746ac6119332bb33b69f516b26b7d30d56d70301ae61a5fe9134c8ca68a7b213701301a01
-
SSDEEP
98304:L3rFsb0LtjiJ7YjWQg3UYOlQ2561e5T222222qt2NUaXTWk+PNQS:L32g5YYj+UYx1eutyUaDN+f
Score8/10-
Checks if the Android device is rooted.
-
Checks known Qemu files.
Checks for known Qemu files that exist on Android virtual device images.
-
Checks known Qemu pipes.
Checks for known pipes used by the Android emulator to communicate with the host.
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the mobile country code (MCC)
-
Queries the phone number (MSISDN for GSM devices)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Reads information about phone network operator.
-
Schedules tasks to execute at a specified time
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Virtualization/Sandbox Evasion
4System Checks
4