General
-
Target
8e1c263109c7f31d4015a90d63eeb435_JaffaCakes118
-
Size
6.7MB
-
Sample
240602-pwl9ascf5x
-
MD5
8e1c263109c7f31d4015a90d63eeb435
-
SHA1
9e63556acfd9c55a1dccc8ca80a9308025084ea0
-
SHA256
424a7cdc136b38cbb0636c67c43cd510adb207a050a2862b48a921cd113fb5be
-
SHA512
5e847619dd0c27808068a2228921d2787f1c3cb2bd4968db0a59502e168f21c826fe7c3d1f7b408ea9d999f526b7c4c2d2291ca0ba35a3d38fce47008851a5d8
-
SSDEEP
196608:DK5aPxEP6xey6Mdr44iqQNMnvVW0BRwF0rm:25mLMy/4g5BqFR
Static task
static1
Behavioral task
behavioral1
Sample
8e1c263109c7f31d4015a90d63eeb435_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
8e1c263109c7f31d4015a90d63eeb435_JaffaCakes118.apk
Resource
android-x64-arm64-20240514-en
Malware Config
Targets
-
-
Target
8e1c263109c7f31d4015a90d63eeb435_JaffaCakes118
-
Size
6.7MB
-
MD5
8e1c263109c7f31d4015a90d63eeb435
-
SHA1
9e63556acfd9c55a1dccc8ca80a9308025084ea0
-
SHA256
424a7cdc136b38cbb0636c67c43cd510adb207a050a2862b48a921cd113fb5be
-
SHA512
5e847619dd0c27808068a2228921d2787f1c3cb2bd4968db0a59502e168f21c826fe7c3d1f7b408ea9d999f526b7c4c2d2291ca0ba35a3d38fce47008851a5d8
-
SSDEEP
196608:DK5aPxEP6xey6Mdr44iqQNMnvVW0BRwF0rm:25mLMy/4g5BqFR
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Virtualization/Sandbox Evasion
2System Checks
2