General
-
Target
9cfeb559030f1c8b64fd874f3402f32d_JaffaCakes118
-
Size
294KB
-
Sample
240611-e8ae6avapg
-
MD5
9cfeb559030f1c8b64fd874f3402f32d
-
SHA1
ddc0ca7603673977a048d724609c24e9967e09a8
-
SHA256
adb879772b8aae36f4580aca165898dc7a09a004e497b0a357e1bb3b0afd9547
-
SHA512
b26c034495c3b7f4c0098c8c349e674bc84467abf28f586f645e892aade0dba86e74589194b523a2e394d31c84979725b32ed9d290bab00b819b56afbe5f8674
-
SSDEEP
6144:m8KYBEnz++R8aDzvOKymDsUUK5kJBSrwkixnqHl1vb7OTQqc67P:3BE6+RDXC4rSSrwbsHvOj
Static task
static1
Behavioral task
behavioral1
Sample
9cfeb559030f1c8b64fd874f3402f32d_JaffaCakes118.apk
Resource
android-x86-arm-20240603-en
Behavioral task
behavioral2
Sample
9cfeb559030f1c8b64fd874f3402f32d_JaffaCakes118.apk
Resource
android-x64-20240603-en
Behavioral task
behavioral3
Sample
9cfeb559030f1c8b64fd874f3402f32d_JaffaCakes118.apk
Resource
android-x64-arm64-20240603-en
Malware Config
Targets
-
-
Target
9cfeb559030f1c8b64fd874f3402f32d_JaffaCakes118
-
Size
294KB
-
MD5
9cfeb559030f1c8b64fd874f3402f32d
-
SHA1
ddc0ca7603673977a048d724609c24e9967e09a8
-
SHA256
adb879772b8aae36f4580aca165898dc7a09a004e497b0a357e1bb3b0afd9547
-
SHA512
b26c034495c3b7f4c0098c8c349e674bc84467abf28f586f645e892aade0dba86e74589194b523a2e394d31c84979725b32ed9d290bab00b819b56afbe5f8674
-
SSDEEP
6144:m8KYBEnz++R8aDzvOKymDsUUK5kJBSrwkixnqHl1vb7OTQqc67P:3BE6+RDXC4rSSrwbsHvOj
-
XLoader payload
-
Checks if the Android device is rooted.
-
Queries the phone number (MSISDN for GSM devices)
-
Reads the content of the MMS message.
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests changing the default SMS application.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-