General
-
Target
814cc255fb09aa69934a0bd6209e2cc2_JaffaCakes118
-
Size
5.1MB
-
Sample
240801-vjb6fsvbpb
-
MD5
814cc255fb09aa69934a0bd6209e2cc2
-
SHA1
ca78b55c86c329788806019c1eae1137ee48ee10
-
SHA256
3529ee191fc7d8a351436adb058e1b3d4f1ab460638eb26eda1e0b5e98800dbb
-
SHA512
9dfb359ea71622c0c33490d77c42912238398ce4e0a9ca5070329348b289c1bfd55ae4e165408d20ec6c9fccd4059701b7689c7ca2472212660a2f46be88805e
-
SSDEEP
98304:yQEeqttwbjkiuBgocZ3MH/oZ7nfF1fiJYiQmwgJ/rtVqJabqZa1MdtyVsobh0:YAbgdgocGM1fi/QmvgJa2KMdpZ
Static task
static1
Behavioral task
behavioral1
Sample
814cc255fb09aa69934a0bd6209e2cc2_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
814cc255fb09aa69934a0bd6209e2cc2_JaffaCakes118.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
814cc255fb09aa69934a0bd6209e2cc2_JaffaCakes118.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Targets
-
-
Target
814cc255fb09aa69934a0bd6209e2cc2_JaffaCakes118
-
Size
5.1MB
-
MD5
814cc255fb09aa69934a0bd6209e2cc2
-
SHA1
ca78b55c86c329788806019c1eae1137ee48ee10
-
SHA256
3529ee191fc7d8a351436adb058e1b3d4f1ab460638eb26eda1e0b5e98800dbb
-
SHA512
9dfb359ea71622c0c33490d77c42912238398ce4e0a9ca5070329348b289c1bfd55ae4e165408d20ec6c9fccd4059701b7689c7ca2472212660a2f46be88805e
-
SSDEEP
98304:yQEeqttwbjkiuBgocZ3MH/oZ7nfF1fiJYiQmwgJ/rtVqJabqZa1MdtyVsobh0:YAbgdgocGM1fi/QmvgJa2KMdpZ
-
Hydra payload
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Queries information about active data network
-
Queries the mobile country code (MCC)
-
Reads information about phone network operator.
-