General
-
Target
95a7d2c96ae5ec2ebcf8bbe27f161b43_JaffaCakes118
-
Size
30.3MB
-
Sample
240604-vv7fqsed35
-
MD5
95a7d2c96ae5ec2ebcf8bbe27f161b43
-
SHA1
0c21310a690c59ff5a20d2ffb78d99c5cd151ea7
-
SHA256
4b44d9f37c12b019bd37a7e858a04cc256babd4232cc4818e0f125dc1845b565
-
SHA512
d55690b5d262df721f8d9770be35a682439955087ed6f64b618dd0121388ce8af9ed6086b1630b26c35d16080fe9db142d15add36d45848141e43c7fb3b6bf38
-
SSDEEP
786432:OsUmn26jOru89GOBdkW1a0ijLHiayHB4E6Sen:Ovmn+u8Tla0YLife0en
Static task
static1
Behavioral task
behavioral1
Sample
95a7d2c96ae5ec2ebcf8bbe27f161b43_JaffaCakes118.apk
Resource
android-x86-arm-20240603-en
Behavioral task
behavioral2
Sample
oppo_game_service_201502.apk
Resource
android-x86-arm-20240603-en
Behavioral task
behavioral3
Sample
oppo_game_service_201502.apk
Resource
android-33-x64-arm64-20240603-en
Malware Config
Targets
-
-
Target
95a7d2c96ae5ec2ebcf8bbe27f161b43_JaffaCakes118
-
Size
30.3MB
-
MD5
95a7d2c96ae5ec2ebcf8bbe27f161b43
-
SHA1
0c21310a690c59ff5a20d2ffb78d99c5cd151ea7
-
SHA256
4b44d9f37c12b019bd37a7e858a04cc256babd4232cc4818e0f125dc1845b565
-
SHA512
d55690b5d262df721f8d9770be35a682439955087ed6f64b618dd0121388ce8af9ed6086b1630b26c35d16080fe9db142d15add36d45848141e43c7fb3b6bf38
-
SSDEEP
786432:OsUmn26jOru89GOBdkW1a0ijLHiayHB4E6Sen:Ovmn+u8Tla0YLife0en
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current nearby Wi-Fi networks
Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-
Listens for changes in the sensor environment (might be used to detect emulation)
-
-
-
Target
oppo_game_service_201502.so
-
Size
4.0MB
-
MD5
fc370ef2928affc169ff3f3e1c856791
-
SHA1
97177d0eca18f7ef0c382739becb744556b4b268
-
SHA256
46c357afba1e7773312156efc729888daaa66ac8165dd6a393f7ab01f23ab5a3
-
SHA512
944bbd29a21a121caa6e0f5cfcb12e6c1db635698add1bcc59b1cc8e882d4858698afb92f653cefcf4b79b37d003647a7e02433f95ecf1e906f9a131abc4a7f3
-
SSDEEP
98304:dVAO2eFa6e3A5NIHcyOxMA5Wf3PcRDeVmMNvn4U2CUE6F6jOU:dDs33A5EcDxFWkmpCURUE6F6jOU
Score1/10 -
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Hide Artifacts
1User Evasion
1Virtualization/Sandbox Evasion
1System Checks
1