General
-
Target
9828bb65f45a5ca4cb27300bb3ee3f80_JaffaCakes118
-
Size
23.1MB
-
Sample
240605-pm4rzsfd3w
-
MD5
9828bb65f45a5ca4cb27300bb3ee3f80
-
SHA1
28804ef7fb300463346924e14f28ce9433e527ae
-
SHA256
44927dd335ad3870aff7fc41d67a6fdfd91990e5597ee37ed0d6183187eb4506
-
SHA512
4267f735356940267bf9a522414a02d13de0ce6870f5954828520e454e0087dec9135a8065ad1dded18d4d68796960dad78a47fd6a1ec93a228959ba695a3cfa
-
SSDEEP
393216:KgPmFTkTmGYclBdyqXSKBHtvI5ofc30MdFmYlRf9hEqzu07U8vB4I3ojyR5vGyec:/PWTkTzvdyqdXvIOlumqRfkA/vBB32yt
Static task
static1
Behavioral task
behavioral1
Sample
9828bb65f45a5ca4cb27300bb3ee3f80_JaffaCakes118.apk
Resource
android-x86-arm-20240603-en
Malware Config
Targets
-
-
Target
9828bb65f45a5ca4cb27300bb3ee3f80_JaffaCakes118
-
Size
23.1MB
-
MD5
9828bb65f45a5ca4cb27300bb3ee3f80
-
SHA1
28804ef7fb300463346924e14f28ce9433e527ae
-
SHA256
44927dd335ad3870aff7fc41d67a6fdfd91990e5597ee37ed0d6183187eb4506
-
SHA512
4267f735356940267bf9a522414a02d13de0ce6870f5954828520e454e0087dec9135a8065ad1dded18d4d68796960dad78a47fd6a1ec93a228959ba695a3cfa
-
SSDEEP
393216:KgPmFTkTmGYclBdyqXSKBHtvI5ofc30MdFmYlRf9hEqzu07U8vB4I3ojyR5vGyec:/PWTkTzvdyqdXvIOlumqRfkA/vBB32yt
Score8/10-
Checks if the Android device is rooted.
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Queries information about active data network
-
Reads information about phone network operator.
-
Checks the presence of a debugger
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Foreground Persistence
1Virtualization/Sandbox Evasion
2System Checks
2