General
-
Target
8272a45a18aae5917ca724f52653f392_JaffaCakes118
-
Size
31.0MB
-
Sample
240530-adpjdaga44
-
MD5
8272a45a18aae5917ca724f52653f392
-
SHA1
83536c59f96c549671d39bb9d497cc727e5b66e4
-
SHA256
04af0e68227027a8344f4a0e5b40d6260b28ba336ee3d94fc73ff8b1249ec144
-
SHA512
1cf9c4d364522dab9a295578b47e839406a5219c6c7ca1055e235ad2036ee89364331c0f1dd6bef83d26f59801baaa54652cf2e453bba3ca4e35596e948485e9
-
SSDEEP
786432:SDLiWSxiGqJ5u1+oAdUZlQcOJFFy9L33JSdlNrxxnB8NJoi:41T1jZKlQccFy9b3MdjxxB8N1
Static task
static1
Behavioral task
behavioral1
Sample
8272a45a18aae5917ca724f52653f392_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
8272a45a18aae5917ca724f52653f392_JaffaCakes118
-
Size
31.0MB
-
MD5
8272a45a18aae5917ca724f52653f392
-
SHA1
83536c59f96c549671d39bb9d497cc727e5b66e4
-
SHA256
04af0e68227027a8344f4a0e5b40d6260b28ba336ee3d94fc73ff8b1249ec144
-
SHA512
1cf9c4d364522dab9a295578b47e839406a5219c6c7ca1055e235ad2036ee89364331c0f1dd6bef83d26f59801baaa54652cf2e453bba3ca4e35596e948485e9
-
SSDEEP
786432:SDLiWSxiGqJ5u1+oAdUZlQcOJFFy9L33JSdlNrxxnB8NJoi:41T1jZKlQccFy9b3MdjxxB8N1
Score8/10-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Acquires the wake lock
-
Checks if the internet connection is available
-
MITRE ATT&CK Mobile v15
Defense Evasion
Execution Guardrails
1Geofencing
1Virtualization/Sandbox Evasion
2System Checks
2