General
-
Target
b18c459680cdc0e038aa8f4a921c544f_JaffaCakes118
-
Size
3.0MB
-
Sample
240616-d27xea1hqj
-
MD5
b18c459680cdc0e038aa8f4a921c544f
-
SHA1
31a0fa1da72f3a7f0d29ade9b397eae8c27a7e6e
-
SHA256
46b783b2bc889b3fbd2cacfdbe0ec6ddd95c8daaa4411b84b9da42f48004e49e
-
SHA512
be735bb36015032e4bbb0aeb3204f841ab0b4a6954e1b41a14087caae5d697a57e3a2cca70e460e194b1bd2fb69099e5a101fc3d809b4dea4a19aa7a167388ca
-
SSDEEP
98304:b/IXp73lyCxvEyibGb9u9MIzpWR3QTAM+ez:+3ly0ErGboUR3QkM+ez
Static task
static1
Behavioral task
behavioral1
Sample
b18c459680cdc0e038aa8f4a921c544f_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
Malware Config
Targets
-
-
Target
b18c459680cdc0e038aa8f4a921c544f_JaffaCakes118
-
Size
3.0MB
-
MD5
b18c459680cdc0e038aa8f4a921c544f
-
SHA1
31a0fa1da72f3a7f0d29ade9b397eae8c27a7e6e
-
SHA256
46b783b2bc889b3fbd2cacfdbe0ec6ddd95c8daaa4411b84b9da42f48004e49e
-
SHA512
be735bb36015032e4bbb0aeb3204f841ab0b4a6954e1b41a14087caae5d697a57e3a2cca70e460e194b1bd2fb69099e5a101fc3d809b4dea4a19aa7a167388ca
-
SSDEEP
98304:b/IXp73lyCxvEyibGb9u9MIzpWR3QTAM+ez:+3ly0ErGboUR3QkM+ez
-
Checks if the Android device is rooted.
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Acquires the wake lock
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the mobile country code (MCC)
-
MITRE ATT&CK Mobile v15
Defense Evasion
Input Injection
1Virtualization/Sandbox Evasion
1System Checks
1Discovery
Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
1System Network Connections Discovery
2