General
-
Target
8abf4d0e70259a301abc74840b2b5c4d_JaffaCakes118
-
Size
436KB
-
Sample
240601-rvs2kafd46
-
MD5
8abf4d0e70259a301abc74840b2b5c4d
-
SHA1
879ed502b8eff4fe0990c966e5bc1015a7c7d493
-
SHA256
6c5be239259baa5be95437c5511f053980eb2781190c07502fa142a8a7d0b6c4
-
SHA512
9d286737b92f06c0c07052e4dc4851268a981ec54a5c85a6aa8b72a892d0aa338c58fb727cec380a243d3ae8150bacd1016039164272ceaa9e46cf0a09beb0ca
-
SSDEEP
12288:nj7h42jkheTpM9riI/KDy0BigC2sgMlvWS:nj7hBja4KmQOy0BiGS
Static task
static1
Behavioral task
behavioral1
Sample
8abf4d0e70259a301abc74840b2b5c4d_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
8abf4d0e70259a301abc74840b2b5c4d_JaffaCakes118.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral3
Sample
8abf4d0e70259a301abc74840b2b5c4d_JaffaCakes118.apk
Resource
android-x64-arm64-20240514-en
Malware Config
Targets
-
-
Target
8abf4d0e70259a301abc74840b2b5c4d_JaffaCakes118
-
Size
436KB
-
MD5
8abf4d0e70259a301abc74840b2b5c4d
-
SHA1
879ed502b8eff4fe0990c966e5bc1015a7c7d493
-
SHA256
6c5be239259baa5be95437c5511f053980eb2781190c07502fa142a8a7d0b6c4
-
SHA512
9d286737b92f06c0c07052e4dc4851268a981ec54a5c85a6aa8b72a892d0aa338c58fb727cec380a243d3ae8150bacd1016039164272ceaa9e46cf0a09beb0ca
-
SSDEEP
12288:nj7h42jkheTpM9riI/KDy0BigC2sgMlvWS:nj7hBja4KmQOy0BiGS
-
XLoader payload
-
Checks if the Android device is rooted.
-
Requests changing the default SMS application.
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Queries the phone number (MSISDN for GSM devices)
-
Reads the content of the MMS message.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Acquires the wake lock
-
Checks if the internet connection is available
-
Reads information about phone network operator.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-