General
-
Target
909fe9b6566368980d5b58f6c770b312_JaffaCakes118
-
Size
13.2MB
-
Sample
240603-frjg6scd9z
-
MD5
909fe9b6566368980d5b58f6c770b312
-
SHA1
8631b107905edf97067f2bc6dd67fa53c8a0aacb
-
SHA256
710fd074ebec8e98a11121e6b4727f97fab28c77c72df327764e27d59cb73863
-
SHA512
8be7c4ea7b539bafbfd948746d8e99e65fde3922d1a4c6a2e19ebf653398d46a506f731caf6d47f407f734d6686a8f55b5015abeb1a7feb2d0925fb22cfd9cb0
-
SSDEEP
393216:VoNcHf1wNefOvoWHA3te8zdfeveVeUezG0l7:KWHf1kgW+te8ZfeveVeUeq0l7
Static task
static1
Behavioral task
behavioral1
Sample
909fe9b6566368980d5b58f6c770b312_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
909fe9b6566368980d5b58f6c770b312_JaffaCakes118.apk
Resource
android-x64-arm64-20240514-en
Behavioral task
behavioral3
Sample
gdtadv2.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
909fe9b6566368980d5b58f6c770b312_JaffaCakes118
-
Size
13.2MB
-
MD5
909fe9b6566368980d5b58f6c770b312
-
SHA1
8631b107905edf97067f2bc6dd67fa53c8a0aacb
-
SHA256
710fd074ebec8e98a11121e6b4727f97fab28c77c72df327764e27d59cb73863
-
SHA512
8be7c4ea7b539bafbfd948746d8e99e65fde3922d1a4c6a2e19ebf653398d46a506f731caf6d47f407f734d6686a8f55b5015abeb1a7feb2d0925fb22cfd9cb0
-
SSDEEP
393216:VoNcHf1wNefOvoWHA3te8zdfeveVeUezG0l7:KWHf1kgW+te8ZfeveVeUeq0l7
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
-
-
Target
gdtadv2.jar
-
Size
385KB
-
MD5
824cb780ec81bb7366121b103e9820c0
-
SHA1
149a0a58257fc4d67722c0a218d4a9119cd9304f
-
SHA256
6d37ca4a40fcbcde1d8aaa1bba643e349614b8600166c50b03e397083725ce90
-
SHA512
658b65bd1b7c044ce4d497378dbdde5915b9e1e57d4911d00df4d694326c15410be7bae556c6ebd335e8f68b619a333856b20213f624874cd0ea1eef0c26672b
-
SSDEEP
6144:oHieHgKECmWW/O4TsEcyFTGl812C9xSzmkoEPn5iXQ9leg6Ob8ggUdJTtUsqpz:kiXbCBW5T7trBxPWA1Ob8sdJTUz
Score1/10 -
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Virtualization/Sandbox Evasion
2System Checks
2