General
-
Target
b70be34f4515966e8ebdb7bc6639505c_JaffaCakes118
-
Size
19.8MB
-
Sample
240617-ghhpys1dlj
-
MD5
b70be34f4515966e8ebdb7bc6639505c
-
SHA1
15e415fd854c3f9a0005cf8237f98636f033b5a8
-
SHA256
94353fb80b5e5af4fb4fc18524a161f7dd15df859a46cb8b2a1082be3a4d0a3d
-
SHA512
d6719782d388143534cbc5b7d28ee5de9f1aa1c8ad96da56f21d9250ab58948d053fefede849a684fe50844ce385f10397ec0bb44534eb833cb948f6715f0fad
-
SSDEEP
393216:EG42JtQlFdqPzFm4JSQUVvrgnpHctu+oqNhZGXF9:EGDJWWPM4wfVvURctu+oyGXv
Static task
static1
Behavioral task
behavioral1
Sample
b70be34f4515966e8ebdb7bc6639505c_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
Behavioral task
behavioral2
Sample
b70be34f4515966e8ebdb7bc6639505c_JaffaCakes118.apk
Resource
android-x64-arm64-20240611.1-en
Malware Config
Targets
-
-
Target
b70be34f4515966e8ebdb7bc6639505c_JaffaCakes118
-
Size
19.8MB
-
MD5
b70be34f4515966e8ebdb7bc6639505c
-
SHA1
15e415fd854c3f9a0005cf8237f98636f033b5a8
-
SHA256
94353fb80b5e5af4fb4fc18524a161f7dd15df859a46cb8b2a1082be3a4d0a3d
-
SHA512
d6719782d388143534cbc5b7d28ee5de9f1aa1c8ad96da56f21d9250ab58948d053fefede849a684fe50844ce385f10397ec0bb44534eb833cb948f6715f0fad
-
SSDEEP
393216:EG42JtQlFdqPzFm4JSQUVvrgnpHctu+oqNhZGXF9:EGDJWWPM4wfVvURctu+oyGXv
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the mobile country code (MCC)
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Virtualization/Sandbox Evasion
2System Checks
2