General
-
Target
a7290f583b7ad5a960f1da6e5d02796d_JaffaCakes118
-
Size
5.4MB
-
Sample
240613-3rmk6awcjd
-
MD5
a7290f583b7ad5a960f1da6e5d02796d
-
SHA1
f2b3a1d61e508f480319b8f6df555cbac2dd242a
-
SHA256
baa630bc3288cb1146c12af9e6016831f73570017ca6fe586810f22ae972f8c6
-
SHA512
d4f39b2a24914c77fbc1fcc86dc68f1ca400f58fc918bc033d4cd37ee394392c439e315a0d0f56525cf45c33b42a69f9b03998128b03f22df20408465938e009
-
SSDEEP
98304:qhytlO9Yi9iUTzVfGDqpGfrvyk3jpcbTtJ+iFge13g0m7BW:qhyzO9Yi4UTzVfGOpor6kVO+iFge13gs
Static task
static1
Behavioral task
behavioral1
Sample
a7290f583b7ad5a960f1da6e5d02796d_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
Behavioral task
behavioral2
Sample
a7290f583b7ad5a960f1da6e5d02796d_JaffaCakes118.apk
Resource
android-x64-20240611.1-en
Behavioral task
behavioral3
Sample
a7290f583b7ad5a960f1da6e5d02796d_JaffaCakes118.apk
Resource
android-x64-arm64-20240611.1-en
Malware Config
Targets
-
-
Target
a7290f583b7ad5a960f1da6e5d02796d_JaffaCakes118
-
Size
5.4MB
-
MD5
a7290f583b7ad5a960f1da6e5d02796d
-
SHA1
f2b3a1d61e508f480319b8f6df555cbac2dd242a
-
SHA256
baa630bc3288cb1146c12af9e6016831f73570017ca6fe586810f22ae972f8c6
-
SHA512
d4f39b2a24914c77fbc1fcc86dc68f1ca400f58fc918bc033d4cd37ee394392c439e315a0d0f56525cf45c33b42a69f9b03998128b03f22df20408465938e009
-
SSDEEP
98304:qhytlO9Yi9iUTzVfGDqpGfrvyk3jpcbTtJ+iFge13g0m7BW:qhyzO9Yi4UTzVfGOpor6kVO+iFge13gs
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Acquires the wake lock
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the mobile country code (MCC)
-
Checks the presence of a debugger
-
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Virtualization/Sandbox Evasion
2System Checks
2