General
-
Target
9dab8c3da71a62ebd0f2c8f9324ec11c_JaffaCakes118
-
Size
431KB
-
Sample
240611-k6c16asckj
-
MD5
9dab8c3da71a62ebd0f2c8f9324ec11c
-
SHA1
8ecb1515175b9441f348c3164dfa37d9f71aa3cb
-
SHA256
bf3f51bf8720246b4afd754164e6a6b5df23a8470121b2a12f0c2ccec6432686
-
SHA512
e84ebcd49f178e750fce33fbd01b9d3f747fc966e6fc80a327f6044585e3ef19db32b2ab0c84896a23fb2725398e4429bb4ae1e325886a3e401f2993669fc383
-
SSDEEP
12288:jKpShoTIg33qZ0WatDIjr1K+h/dOkScVEOZnpCVC:OkazqZJKc1xldOkSc3ZnpCVC
Static task
static1
Behavioral task
behavioral1
Sample
9dab8c3da71a62ebd0f2c8f9324ec11c_JaffaCakes118.apk
Resource
android-x86-arm-20240603-en
Behavioral task
behavioral2
Sample
9dab8c3da71a62ebd0f2c8f9324ec11c_JaffaCakes118.apk
Resource
android-x64-20240603-en
Behavioral task
behavioral3
Sample
9dab8c3da71a62ebd0f2c8f9324ec11c_JaffaCakes118.apk
Resource
android-x64-arm64-20240603-en
Malware Config
Extracted
xloader_apk
http://91.204.227.39:28844
Targets
-
-
Target
9dab8c3da71a62ebd0f2c8f9324ec11c_JaffaCakes118
-
Size
431KB
-
MD5
9dab8c3da71a62ebd0f2c8f9324ec11c
-
SHA1
8ecb1515175b9441f348c3164dfa37d9f71aa3cb
-
SHA256
bf3f51bf8720246b4afd754164e6a6b5df23a8470121b2a12f0c2ccec6432686
-
SHA512
e84ebcd49f178e750fce33fbd01b9d3f747fc966e6fc80a327f6044585e3ef19db32b2ab0c84896a23fb2725398e4429bb4ae1e325886a3e401f2993669fc383
-
SSDEEP
12288:jKpShoTIg33qZ0WatDIjr1K+h/dOkScVEOZnpCVC:OkazqZJKc1xldOkSc3ZnpCVC
-
XLoader payload
-
Checks if the Android device is rooted.
-
Queries account information for other applications stored on the device
Application may abuse the framework's APIs to collect account information stored on the device.
-
Queries the phone number (MSISDN for GSM devices)
-
Reads the content of the MMS message.
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Reads information about phone network operator.
-
Requests changing the default SMS application.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-