General
-
Target
af87e4e46b056615beccb816d623fbff_JaffaCakes118
-
Size
10.2MB
-
Sample
240615-vxwr1sycqa
-
MD5
af87e4e46b056615beccb816d623fbff
-
SHA1
0a932b4e8fd991fe3c07e6cb5fbd9e0f132293d3
-
SHA256
8289c7bf941e9686b1e5cc1b7ba456e8489c9457e90613c1b570244e374de8b7
-
SHA512
37fb986b23643ec1034f8a1dbdad3ac649b3d3c45f7eb185481dbefa2a5818c8e5f0d444b8a3649156a81998a7659aedd07bbbdd6ac32874185a2cc4e6c7c874
-
SSDEEP
196608:iQuiSEQll0/m+voL/sChqLLf6wxEOKJ7y51cRH9U1OYR/BOrBbBC6iqzI:iQeRj0/1voL/s0qf6e/51cRH9UUo/BOe
Static task
static1
Behavioral task
behavioral1
Sample
af87e4e46b056615beccb816d623fbff_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
Behavioral task
behavioral2
Sample
af87e4e46b056615beccb816d623fbff_JaffaCakes118.apk
Resource
android-x64-20240611.1-en
Malware Config
Targets
-
-
Target
af87e4e46b056615beccb816d623fbff_JaffaCakes118
-
Size
10.2MB
-
MD5
af87e4e46b056615beccb816d623fbff
-
SHA1
0a932b4e8fd991fe3c07e6cb5fbd9e0f132293d3
-
SHA256
8289c7bf941e9686b1e5cc1b7ba456e8489c9457e90613c1b570244e374de8b7
-
SHA512
37fb986b23643ec1034f8a1dbdad3ac649b3d3c45f7eb185481dbefa2a5818c8e5f0d444b8a3649156a81998a7659aedd07bbbdd6ac32874185a2cc4e6c7c874
-
SSDEEP
196608:iQuiSEQll0/m+voL/sChqLLf6wxEOKJ7y51cRH9U1OYR/BOrBbBC6iqzI:iQeRj0/1voL/s0qf6e/51cRH9UUo/BOe
-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current nearby Wi-Fi networks
Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-
Listens for changes in the sensor environment (might be used to detect emulation)
-
MITRE ATT&CK Mobile v15
Defense Evasion
Execution Guardrails
1Geofencing
1Hide Artifacts
1User Evasion
1Virtualization/Sandbox Evasion
1System Checks
1