General
-
Target
ae299222842d2a111c0ae72456f3b45d_JaffaCakes118
-
Size
15.5MB
-
Sample
240615-nc91ksscnn
-
MD5
ae299222842d2a111c0ae72456f3b45d
-
SHA1
a2626aa68d4c91800422208fcefb1a9cf01e861f
-
SHA256
ca4ddaab10f690f4cce426e3d8f407d9fc92da0acec637bdc13b6961410e86ba
-
SHA512
b4a512c022ea3693f92e55fd836282352e122fcc457ecce121424e5a325c4be950b60b99b35c3007b8c4932df1935f0ecb7bee09463d91feb3bd1f0cc710dd04
-
SSDEEP
393216:keUt7w09FM9DxyRkdHMfYppiUe30dhzk6ICi:keQh3M9dyR0sUDQGhtni
Static task
static1
Behavioral task
behavioral1
Sample
ae299222842d2a111c0ae72456f3b45d_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
Behavioral task
behavioral2
Sample
ae299222842d2a111c0ae72456f3b45d_JaffaCakes118.apk
Resource
android-x64-arm64-20240611.1-en
Malware Config
Targets
-
-
Target
ae299222842d2a111c0ae72456f3b45d_JaffaCakes118
-
Size
15.5MB
-
MD5
ae299222842d2a111c0ae72456f3b45d
-
SHA1
a2626aa68d4c91800422208fcefb1a9cf01e861f
-
SHA256
ca4ddaab10f690f4cce426e3d8f407d9fc92da0acec637bdc13b6961410e86ba
-
SHA512
b4a512c022ea3693f92e55fd836282352e122fcc457ecce121424e5a325c4be950b60b99b35c3007b8c4932df1935f0ecb7bee09463d91feb3bd1f0cc710dd04
-
SSDEEP
393216:keUt7w09FM9DxyRkdHMfYppiUe30dhzk6ICi:keQh3M9dyR0sUDQGhtni
Score8/10-
Checks if the Android device is rooted.
-
Checks known Qemu files.
Checks for known Qemu files that exist on Android virtual device images.
-
Checks known Qemu pipes.
Checks for known pipes used by the Android emulator to communicate with the host.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current nearby Wi-Fi networks
Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-
Listens for changes in the sensor environment (might be used to detect emulation)
-
MITRE ATT&CK Mobile v15
Defense Evasion
Execution Guardrails
1Geofencing
1Hide Artifacts
1User Evasion
1Virtualization/Sandbox Evasion
4System Checks
4