General
-
Target
a11191a192d205dafbf7fc3085013b79_JaffaCakes118
-
Size
24.2MB
-
Sample
240612-sb3x4ashqn
-
MD5
a11191a192d205dafbf7fc3085013b79
-
SHA1
0391a5c70f81e97939fd6ece52daa85fe0ed8a3c
-
SHA256
1bb29769000103a5329a3c170b0e0f4414ad64fd33f829c2a3e5219e2787fcab
-
SHA512
3902dd00d5ff28f1ac743373c6d441ff06b91724f49a433bec5898a9599508fe052f4fcdcfd4c88906e5192ea218a58906062d13af54b4b6f0dd41e8489cacc2
-
SSDEEP
786432:rjy7DUbyE8K78nouUo/5VLiJWNsJQcT+LGDYwEM1:/+UbLX7qokVLiJWNKzT+q51
Static task
static1
Behavioral task
behavioral1
Sample
a11191a192d205dafbf7fc3085013b79_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
Behavioral task
behavioral2
Sample
gdtadv2.apk
Resource
android-x86-arm-20240611.1-en
Malware Config
Targets
-
-
Target
a11191a192d205dafbf7fc3085013b79_JaffaCakes118
-
Size
24.2MB
-
MD5
a11191a192d205dafbf7fc3085013b79
-
SHA1
0391a5c70f81e97939fd6ece52daa85fe0ed8a3c
-
SHA256
1bb29769000103a5329a3c170b0e0f4414ad64fd33f829c2a3e5219e2787fcab
-
SHA512
3902dd00d5ff28f1ac743373c6d441ff06b91724f49a433bec5898a9599508fe052f4fcdcfd4c88906e5192ea218a58906062d13af54b4b6f0dd41e8489cacc2
-
SSDEEP
786432:rjy7DUbyE8K78nouUo/5VLiJWNsJQcT+LGDYwEM1:/+UbLX7qokVLiJWNKzT+q51
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Listens for changes in the sensor environment (might be used to detect emulation)
-
-
-
Target
gdtadv2.jar
-
Size
468KB
-
MD5
6bfe094580c89ba696ef8772de47a552
-
SHA1
210bc4afce84b6e6bb36f97f68f9d3d9d3432643
-
SHA256
a884e386bf4ec066c9a82518c354be513182add87107552b1f4cf33dc80bddd4
-
SHA512
7ae8c9210957f06eb177fa0472ac1fcf80f0e6b1f308ec1906fe059c38623e404b37c34d9e8702cab66efc7ebfdc5400f1506db89b75a5fd1dd915ec2c2086a5
-
SSDEEP
6144:Nz015KiQP/B4tKQ3OTNgdJHqn+9ZMsH5EK9JKp0KMNd4IoCJlv0gxWky9+T2k57:N/Z/B/NgdliEZMs9JhZ4kykTlJ
Score1/10 -
MITRE ATT&CK Mobile v15
Defense Evasion
Execution Guardrails
1Geofencing
1Hide Artifacts
1User Evasion
1Virtualization/Sandbox Evasion
1System Checks
1