General
-
Target
98bf3efb6858583f5f45194cae67f4f7_JaffaCakes118
-
Size
1.8MB
-
Sample
240605-vxb3lsch2w
-
MD5
98bf3efb6858583f5f45194cae67f4f7
-
SHA1
434087be4e97095420845ee6481b0958e3bb4738
-
SHA256
cd061bd40725c82c0e8d29810054708e3196fb70cbaf243769d2bb81dc50fc8d
-
SHA512
2943e5d967612b55623e9c30f91509712c981b3877efc12ed46cb481daffb8e72046a26dc2c2853faa4dc54fd0173706ebc17fe8ccfab840e51b979aa83d2bb6
-
SSDEEP
49152:Fs1uKDj28WwOnrvYU4YxrngyKKx4Tfyd77voeWJBOefxf4/n:QXf28WwkrvYZmrgpLyd7Yxi
Static task
static1
Behavioral task
behavioral1
Sample
98bf3efb6858583f5f45194cae67f4f7_JaffaCakes118.apk
Resource
android-x86-arm-20240603-en
Behavioral task
behavioral2
Sample
dERlZG.apk
Resource
android-x86-arm-20240603-en
Behavioral task
behavioral3
Sample
dERlZG.apk
Resource
android-x64-20240603-en
Behavioral task
behavioral4
Sample
dERlZG.apk
Resource
android-x64-arm64-20240603-en
Behavioral task
behavioral5
Sample
dynamiclib.apk
Resource
android-x86-arm-20240603-en
Behavioral task
behavioral6
Sample
dynamiclib.apk
Resource
android-x64-20240603-en
Behavioral task
behavioral7
Sample
dynamiclib.apk
Resource
android-x64-arm64-20240603-en
Malware Config
Targets
-
-
Target
98bf3efb6858583f5f45194cae67f4f7_JaffaCakes118
-
Size
1.8MB
-
MD5
98bf3efb6858583f5f45194cae67f4f7
-
SHA1
434087be4e97095420845ee6481b0958e3bb4738
-
SHA256
cd061bd40725c82c0e8d29810054708e3196fb70cbaf243769d2bb81dc50fc8d
-
SHA512
2943e5d967612b55623e9c30f91509712c981b3877efc12ed46cb481daffb8e72046a26dc2c2853faa4dc54fd0173706ebc17fe8ccfab840e51b979aa83d2bb6
-
SSDEEP
49152:Fs1uKDj28WwOnrvYU4YxrngyKKx4Tfyd77voeWJBOefxf4/n:QXf28WwkrvYZmrgpLyd7Yxi
Score7/10-
Queries the phone number (MSISDN for GSM devices)
-
Reads the content of SMS inbox messages.
-
Reads the content of the SMS messages.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the mobile country code (MCC)
-
Reads information about phone network operator.
-
Requests dangerous framework permissions
-
-
-
Target
dERlZG
-
Size
96KB
-
MD5
38e2a484a18765834e721e42df3b89cb
-
SHA1
21bb2bc4f29e40abdb103b9d64af815956cb504b
-
SHA256
77ff63fc4125b3c1bf970feb1722e02cf43c9c4d6abeff4b2cccb6a9e55a51ef
-
SHA512
1ad43dbcfdffe2c21649e043ed3e6a61f81f69ac53bac68a9350624b3613be8c249ff0df5b8b7711cb13e030033d23aa71bc3f730becabede1040417f576a618
-
SSDEEP
1536:Kh6mBpBM3vDKmJJj0Z/maH2/88Hsv0SBblAi9HQ1oF1YOVUAOgrULB+hsr:UFKbPIZ/me8Mv0s1q25VU3lBwsr
Score1/10 -
-
-
Target
dynamiclib.bin
-
Size
50KB
-
MD5
420af8883b28b70fa5698fc2c9bc1ae2
-
SHA1
80b2d0868f0c2170f93d2f93c61c8b430936d181
-
SHA256
611bbbd83419cac7976482fefa632fbb138332fb1cebc494f114787b66ade248
-
SHA512
f72fd329d7b9ecc7d6c7c7c117ff638456201d3797821fdd9eb8b6d5f862544507fd62985a3ecffdb33349851f6e65920962fa44f24bef20b042bcf0ca9ec645
-
SSDEEP
1536:cQCX8PNdBpV91XMH8h7K50LdxIakqKcUG6:D/PDBpL1ceWQJBvUG6
Score1/10 -
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Execution Guardrails
1Geofencing
1Virtualization/Sandbox Evasion
2System Checks
2