General
-
Target
9f34f8ed1573d33b56ffeb628dd33559_JaffaCakes118
-
Size
431KB
-
Sample
240611-xjd16axelp
-
MD5
9f34f8ed1573d33b56ffeb628dd33559
-
SHA1
fa73ac11441b981cbb732405d419297bdcc5d953
-
SHA256
af8751dd7b2f5d994291189b618076cf10cc591dff509e54195eed29b2478ffa
-
SHA512
ef220f4be0f3b8fd4b8e3d888240d81f7d8c3ae4a2a2c1caef3e7b90be1978f19534a89dc6e4e1fb84e03872884a926497db59aeafc840705cd0fe8589bbffe3
-
SSDEEP
12288:spBU9+y1M4QA9K5a6b5vDjzCvlb7VboRJ3oq:iO9tmoK/8tBorz
Static task
static1
Behavioral task
behavioral1
Sample
9f34f8ed1573d33b56ffeb628dd33559_JaffaCakes118.apk
Resource
android-x86-arm-20240611-en
Behavioral task
behavioral2
Sample
9f34f8ed1573d33b56ffeb628dd33559_JaffaCakes118.apk
Resource
android-x64-20240611-en
Behavioral task
behavioral3
Sample
9f34f8ed1573d33b56ffeb628dd33559_JaffaCakes118.apk
Resource
android-x64-arm64-20240611-en
Malware Config
Extracted
xloader_apk
http://91.204.227.39:28844
Targets
-
-
Target
9f34f8ed1573d33b56ffeb628dd33559_JaffaCakes118
-
Size
431KB
-
MD5
9f34f8ed1573d33b56ffeb628dd33559
-
SHA1
fa73ac11441b981cbb732405d419297bdcc5d953
-
SHA256
af8751dd7b2f5d994291189b618076cf10cc591dff509e54195eed29b2478ffa
-
SHA512
ef220f4be0f3b8fd4b8e3d888240d81f7d8c3ae4a2a2c1caef3e7b90be1978f19534a89dc6e4e1fb84e03872884a926497db59aeafc840705cd0fe8589bbffe3
-
SSDEEP
12288:spBU9+y1M4QA9K5a6b5vDjzCvlb7VboRJ3oq:iO9tmoK/8tBorz
-
XLoader payload
-
Checks if the Android device is rooted.
-
Queries account information for other applications stored on the device
Application may abuse the framework's APIs to collect account information stored on the device.
-
Queries the phone number (MSISDN for GSM devices)
-
Reads the content of the MMS message.
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-
Requests changing the default SMS application.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-