General
-
Target
bc1cffd1ca941c5d40c99c8876602c99_JaffaCakes118
-
Size
12.3MB
-
Sample
240618-qfepysygmm
-
MD5
bc1cffd1ca941c5d40c99c8876602c99
-
SHA1
21038bcc5571f33a2fd2ff8500c347b0e20668d8
-
SHA256
3ca357b28ae4ab1a5270d89050ad4b5662d4ba16e18858198053e319ef54bf79
-
SHA512
44ba9c56baed211a867cb3476db09e4a88fe7cbba78e1a50177e197e2ad0b02e2bb3e48fd701af3d02d4a07fc005bdfd3fc3f1a0c0495df11a2ee8d8a3d7f81d
-
SSDEEP
196608:YD2jJW053tRDxUgtu4usSQY/URNLiwedO/C45f4pyoMBpkhgaN+6L/706ddll9qk:YgY05dKs7YGFC4bBpMdT0slTKUTzcRRI
Static task
static1
Behavioral task
behavioral1
Sample
bc1cffd1ca941c5d40c99c8876602c99_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
Behavioral task
behavioral2
Sample
bc1cffd1ca941c5d40c99c8876602c99_JaffaCakes118.apk
Resource
android-33-x64-arm64-20240611.1-en
Malware Config
Targets
-
-
Target
bc1cffd1ca941c5d40c99c8876602c99_JaffaCakes118
-
Size
12.3MB
-
MD5
bc1cffd1ca941c5d40c99c8876602c99
-
SHA1
21038bcc5571f33a2fd2ff8500c347b0e20668d8
-
SHA256
3ca357b28ae4ab1a5270d89050ad4b5662d4ba16e18858198053e319ef54bf79
-
SHA512
44ba9c56baed211a867cb3476db09e4a88fe7cbba78e1a50177e197e2ad0b02e2bb3e48fd701af3d02d4a07fc005bdfd3fc3f1a0c0495df11a2ee8d8a3d7f81d
-
SSDEEP
196608:YD2jJW053tRDxUgtu4usSQY/URNLiwedO/C45f4pyoMBpkhgaN+6L/706ddll9qk:YgY05dKs7YGFC4bBpMdT0slTKUTzcRRI
-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Scheduled Task/Job
1Defense Evasion
Execution Guardrails
1Geofencing
1Virtualization/Sandbox Evasion
2System Checks
2