General
-
Target
846bf746ca7aee1a56b3b3da22ef639d_JaffaCakes118
-
Size
31.4MB
-
Sample
240530-rg1jgsbb9t
-
MD5
846bf746ca7aee1a56b3b3da22ef639d
-
SHA1
4b3a76068103ab6573f35f69a1625c96d032dc01
-
SHA256
a7a76116c9bf55fbe8a3498cbc11093ee46f524d33efa126767c8ad571b65d02
-
SHA512
bddc6fc033d01d8f7203643d68003919d3bc598e3161115d99e9226d5dabe2bcb8bd890ad16f010180bd5e2f22a0f87e2e487d75ca6fb6507015065f5525a514
-
SSDEEP
786432:zz7JqhGfJYrtHT43npLRUazxb17gx0zP0UTiDeP0YpFuS2vUXLJbEWs:n7GGfEknpnBELDPYpcSMUm
Static task
static1
Behavioral task
behavioral1
Sample
846bf746ca7aee1a56b3b3da22ef639d_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
846bf746ca7aee1a56b3b3da22ef639d_JaffaCakes118.apk
Resource
android-x64-arm64-20240514-en
Behavioral task
behavioral3
Sample
gdtadv2.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
846bf746ca7aee1a56b3b3da22ef639d_JaffaCakes118
-
Size
31.4MB
-
MD5
846bf746ca7aee1a56b3b3da22ef639d
-
SHA1
4b3a76068103ab6573f35f69a1625c96d032dc01
-
SHA256
a7a76116c9bf55fbe8a3498cbc11093ee46f524d33efa126767c8ad571b65d02
-
SHA512
bddc6fc033d01d8f7203643d68003919d3bc598e3161115d99e9226d5dabe2bcb8bd890ad16f010180bd5e2f22a0f87e2e487d75ca6fb6507015065f5525a514
-
SSDEEP
786432:zz7JqhGfJYrtHT43npLRUazxb17gx0zP0UTiDeP0YpFuS2vUXLJbEWs:n7GGfEknpnBELDPYpcSMUm
-
Checks if the Android device is rooted.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries information about the current nearby Wi-Fi networks
Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-
Listens for changes in the sensor environment (might be used to detect emulation)
-
-
-
Target
gdtadv2.jar
-
Size
622KB
-
MD5
925c89def267b4f087278431a2ea1ba2
-
SHA1
f512786fbd277978de2ddbd3855db0aa730e4305
-
SHA256
7dedfed3255e64dea6cbe43789a32583c9e3a9214d527c8125071be4ad7c1d1d
-
SHA512
f2b414ad33fa2f176162ec0e4e9fd1fa53233cd40395e616c52a60e5fcfb820be0d464520cb8c568c7090a3fbed4be2eb1d9999b6fa487e3de5851d6aed65dc9
-
SSDEEP
12288:WpStF524rz2xSbYm5iXuT/w+GMeoZNsAQvoMn+f+BY8CXGec:WAtbfrzZquT/e1aWAQAM8+
Score1/10 -
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Execution Guardrails
1Geofencing
1Hide Artifacts
1User Evasion
1Virtualization/Sandbox Evasion
2System Checks
2