General
-
Target
8cf8c473e9d2e1014f2d8eafe369e471_JaffaCakes118
-
Size
207KB
-
Sample
240812-c13evswamh
-
MD5
8cf8c473e9d2e1014f2d8eafe369e471
-
SHA1
bc6671d0d4042ca00c9ed3253e50c8b7d56786dd
-
SHA256
1799aa752deef8d20e228fa22dbccd763560e0fa2704eabfab98d8b72ddf2d27
-
SHA512
ff9fc1493e03381cc7dcdc56227ed343716baca828511a387e15bb701392e0c34f512ed5f58a4e913037e9ee23e294cae6043395df32a378359f27b8e7456a57
-
SSDEEP
3072:QWOdAVGUH5Uc0ejb+8pCAtHcNwutbvAEMyotEKdudxvgJv5lQWsIX/lkEVM+f5o/:ZOa0xLUi8JHawutUEfokKlZbPLfeGAUY
Static task
static1
Behavioral task
behavioral1
Sample
8cf8c473e9d2e1014f2d8eafe369e471_JaffaCakes118.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Extracted
xloader_apk
http://91.204.227.39:28844
Targets
-
-
Target
8cf8c473e9d2e1014f2d8eafe369e471_JaffaCakes118
-
Size
207KB
-
MD5
8cf8c473e9d2e1014f2d8eafe369e471
-
SHA1
bc6671d0d4042ca00c9ed3253e50c8b7d56786dd
-
SHA256
1799aa752deef8d20e228fa22dbccd763560e0fa2704eabfab98d8b72ddf2d27
-
SHA512
ff9fc1493e03381cc7dcdc56227ed343716baca828511a387e15bb701392e0c34f512ed5f58a4e913037e9ee23e294cae6043395df32a378359f27b8e7456a57
-
SSDEEP
3072:QWOdAVGUH5Uc0ejb+8pCAtHcNwutbvAEMyotEKdudxvgJv5lQWsIX/lkEVM+f5o/:ZOa0xLUi8JHawutUEfokKlZbPLfeGAUY
-
XLoader payload
-
Checks if the Android device is rooted.
-
Queries the phone number (MSISDN for GSM devices)
-
Reads the content of the MMS message.
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests changing the default SMS application.
-