General
-
Target
ba431f7dd7dbabce82048e176873b0ad_JaffaCakes118
-
Size
404KB
-
Sample
240618-aqdmmszelb
-
MD5
ba431f7dd7dbabce82048e176873b0ad
-
SHA1
12ee7e8caebaff3b146618cf6c2db46eb41af80c
-
SHA256
193fa5479037e3eb0497d2b474717dc9db90a29e3dfba7c9c21ee3f0ee5d2372
-
SHA512
6fafe47584ad8e9d402fed3869dbce55d894e3d0fd0b590049d0caf9894d95b446c51a3d57715e2c1e7f06156f4f2bae014e8bccdf1878017374a2b15cdc1562
-
SSDEEP
6144:farNRurRmmm7gMOqKFM/VVck9s+ld1pXCrfhikmk8F4nVEgltr9q/oYaSwuM+CrW:I3HYGLawd1ELhjsK5trw3FvCpQ
Static task
static1
Behavioral task
behavioral1
Sample
ba431f7dd7dbabce82048e176873b0ad_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
Behavioral task
behavioral2
Sample
ba431f7dd7dbabce82048e176873b0ad_JaffaCakes118.apk
Resource
android-x64-20240611.1-en
Behavioral task
behavioral3
Sample
ba431f7dd7dbabce82048e176873b0ad_JaffaCakes118.apk
Resource
android-x64-arm64-20240611.1-en
Malware Config
Targets
-
-
Target
ba431f7dd7dbabce82048e176873b0ad_JaffaCakes118
-
Size
404KB
-
MD5
ba431f7dd7dbabce82048e176873b0ad
-
SHA1
12ee7e8caebaff3b146618cf6c2db46eb41af80c
-
SHA256
193fa5479037e3eb0497d2b474717dc9db90a29e3dfba7c9c21ee3f0ee5d2372
-
SHA512
6fafe47584ad8e9d402fed3869dbce55d894e3d0fd0b590049d0caf9894d95b446c51a3d57715e2c1e7f06156f4f2bae014e8bccdf1878017374a2b15cdc1562
-
SSDEEP
6144:farNRurRmmm7gMOqKFM/VVck9s+ld1pXCrfhikmk8F4nVEgltr9q/oYaSwuM+CrW:I3HYGLawd1ELhjsK5trw3FvCpQ
-
XLoader payload
-
Checks if the Android device is rooted.
-
Queries the phone number (MSISDN for GSM devices)
-
Reads the content of the MMS message.
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Queries information about active data network
-
Reads information about phone network operator.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-