General
-
Target
97c9e863325a693790c50d3bde89ab98_JaffaCakes118
-
Size
6.6MB
-
Sample
240605-lwb7jsdb95
-
MD5
97c9e863325a693790c50d3bde89ab98
-
SHA1
ddc58df7a0ed54ac17f22b11d08b6787c3d14b5f
-
SHA256
812e3a8888cd507c8efc2540480d31bdeb29b4964538ceb0f216c5b6d1c0fdcc
-
SHA512
b8acafb3aaee7b746878beeeead3b5f452d32d88d803a468d475c74f9d14bcea0b36c851bc439f1991a8a6e54d8331538ba0928e818476cba71f05bb3e994125
-
SSDEEP
196608:2C8VZNR/DWCmRaeagfo9MqtDI56qaQmhSEIGCEG//ZGRt:d8VTR/DWCmQgere5/aQmhSEDFY/it
Static task
static1
Behavioral task
behavioral1
Sample
97c9e863325a693790c50d3bde89ab98_JaffaCakes118.apk
Resource
android-x86-arm-20240603-en
Malware Config
Targets
-
-
Target
97c9e863325a693790c50d3bde89ab98_JaffaCakes118
-
Size
6.6MB
-
MD5
97c9e863325a693790c50d3bde89ab98
-
SHA1
ddc58df7a0ed54ac17f22b11d08b6787c3d14b5f
-
SHA256
812e3a8888cd507c8efc2540480d31bdeb29b4964538ceb0f216c5b6d1c0fdcc
-
SHA512
b8acafb3aaee7b746878beeeead3b5f452d32d88d803a468d475c74f9d14bcea0b36c851bc439f1991a8a6e54d8331538ba0928e818476cba71f05bb3e994125
-
SSDEEP
196608:2C8VZNR/DWCmRaeagfo9MqtDI56qaQmhSEIGCEG//ZGRt:d8VTR/DWCmQgere5/aQmhSEDFY/it
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the mobile country code (MCC)
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-
Listens for changes in the sensor environment (might be used to detect emulation)
-
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Hide Artifacts
1User Evasion
1Virtualization/Sandbox Evasion
2System Checks
2