General
-
Target
9ffc412f1a3e56a54311865815f24cf3_JaffaCakes118
-
Size
17.2MB
-
Sample
240612-j3sf1avgrh
-
MD5
9ffc412f1a3e56a54311865815f24cf3
-
SHA1
c696a7f7254967aaf53d707425bbb1d603fa98f5
-
SHA256
30a217274c3b1d7e5670e8fe7cdc5593b140c93e5bad22d7f933b1cea8339ebe
-
SHA512
4330fa8180b57ec7e3d7052277da49ed38f8b433e5503137bfd91a5b8cdd1df52fc2e7866835280da2e486af4985df301f623c61ac9ef322fca91f77395a0a5b
-
SSDEEP
393216:kELrC6DTYNZzESLfXpEoKl6Vqo5RP6b3jp9XgTet51L7ZEu6q9uLlYItDx1u:HC6DcNXqlNoDPQ3jDHRL7ZEu6NWkzu
Static task
static1
Behavioral task
behavioral1
Sample
9ffc412f1a3e56a54311865815f24cf3_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
Behavioral task
behavioral2
Sample
gdtadv2.apk
Resource
android-x86-arm-20240611.1-en
Malware Config
Targets
-
-
Target
9ffc412f1a3e56a54311865815f24cf3_JaffaCakes118
-
Size
17.2MB
-
MD5
9ffc412f1a3e56a54311865815f24cf3
-
SHA1
c696a7f7254967aaf53d707425bbb1d603fa98f5
-
SHA256
30a217274c3b1d7e5670e8fe7cdc5593b140c93e5bad22d7f933b1cea8339ebe
-
SHA512
4330fa8180b57ec7e3d7052277da49ed38f8b433e5503137bfd91a5b8cdd1df52fc2e7866835280da2e486af4985df301f623c61ac9ef322fca91f77395a0a5b
-
SSDEEP
393216:kELrC6DTYNZzESLfXpEoKl6Vqo5RP6b3jp9XgTet51L7ZEu6q9uLlYItDx1u:HC6DcNXqlNoDPQ3jDHRL7ZEu6NWkzu
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current nearby Wi-Fi networks
Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.
-
Queries information about active data network
-
Queries the mobile country code (MCC)
-
Reads information about phone network operator.
-
Listens for changes in the sensor environment (might be used to detect emulation)
-
-
-
Target
gdtadv2.jar
-
Size
443KB
-
MD5
232146e2595dbcc4917a3ae7b3663b3c
-
SHA1
3deedba5289f3eddc87cf35c06ba6c6aa1380275
-
SHA256
abbda9c3353d88c4de9df8880b962fe7958c610cbf54e3e57568af80cd504711
-
SHA512
43fc0b3687d54dfaecc0a53ce290c59ba4b35540b0348f28edede81fd8e96888dabe7c008eb0d1d8d4fd23c76ace1ff570dd9175695f25a5aaad055f1dfc0d69
-
SSDEEP
6144:Nvd0m3MKiQr/B49UXhtjKzGLCrR8A5ZpKkUuf/nVo9v1LIMyXiBqpMoZInOrGPuB:j1F/BkURZdiL7UInV8xIbXolwCO6xu
Score1/10 -
MITRE ATT&CK Mobile v15
Defense Evasion
Execution Guardrails
1Geofencing
1Hide Artifacts
1User Evasion
1Virtualization/Sandbox Evasion
2System Checks
2