General
-
Target
bcbbc29a9efca7a348756a937ddb8d98_JaffaCakes118
-
Size
13.3MB
-
Sample
240618-s7jjbstgrl
-
MD5
bcbbc29a9efca7a348756a937ddb8d98
-
SHA1
b4b10b3464cd4403c6a0eced8f64097f49b95c56
-
SHA256
2f2ab80f37d541981ab8eada1d003a62287229bef9b86c2c300d8b6b1d68e3e5
-
SHA512
aa6c0c96aabf44bdc9b86eb4c0cf9e85b8af43528ea675ea24f081c38bde403c3381973c10915d7484a0281238149ada75344e7c2ca52facdf9cb39cd1a4487e
-
SSDEEP
393216:b43njqDYO+T2azs+T8kjTsYAVQ0IjwZ0so3D3nHV:b43nNfzs+T8T9pIC1MD3nHV
Static task
static1
Behavioral task
behavioral1
Sample
bcbbc29a9efca7a348756a937ddb8d98_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
Behavioral task
behavioral2
Sample
bcbbc29a9efca7a348756a937ddb8d98_JaffaCakes118.apk
Resource
android-x64-arm64-20240611.1-en
Behavioral task
behavioral3
Sample
gdtadv2.apk
Resource
android-x86-arm-20240611.1-en
Malware Config
Targets
-
-
Target
bcbbc29a9efca7a348756a937ddb8d98_JaffaCakes118
-
Size
13.3MB
-
MD5
bcbbc29a9efca7a348756a937ddb8d98
-
SHA1
b4b10b3464cd4403c6a0eced8f64097f49b95c56
-
SHA256
2f2ab80f37d541981ab8eada1d003a62287229bef9b86c2c300d8b6b1d68e3e5
-
SHA512
aa6c0c96aabf44bdc9b86eb4c0cf9e85b8af43528ea675ea24f081c38bde403c3381973c10915d7484a0281238149ada75344e7c2ca52facdf9cb39cd1a4487e
-
SSDEEP
393216:b43njqDYO+T2azs+T8kjTsYAVQ0IjwZ0so3D3nHV:b43nNfzs+T8T9pIC1MD3nHV
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current nearby Wi-Fi networks
Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.
-
Queries the phone number (MSISDN for GSM devices)
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Listens for changes in the sensor environment (might be used to detect emulation)
-
-
-
Target
gdtadv2.jar
-
Size
622KB
-
MD5
925c89def267b4f087278431a2ea1ba2
-
SHA1
f512786fbd277978de2ddbd3855db0aa730e4305
-
SHA256
7dedfed3255e64dea6cbe43789a32583c9e3a9214d527c8125071be4ad7c1d1d
-
SHA512
f2b414ad33fa2f176162ec0e4e9fd1fa53233cd40395e616c52a60e5fcfb820be0d464520cb8c568c7090a3fbed4be2eb1d9999b6fa487e3de5851d6aed65dc9
-
SSDEEP
12288:WpStF524rz2xSbYm5iXuT/w+GMeoZNsAQvoMn+f+BY8CXGec:WAtbfrzZquT/e1aWAQAM8+
Score1/10 -
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Execution Guardrails
1Geofencing
1Hide Artifacts
1User Evasion
1Virtualization/Sandbox Evasion
1System Checks
1