General
-
Target
b779eef1b41acc4dd3f6b44faaf717d2_JaffaCakes118
-
Size
5.9MB
-
Sample
240822-nqndqsvcng
-
MD5
b779eef1b41acc4dd3f6b44faaf717d2
-
SHA1
74d24e0be677caa680186c890f560599570f7f3e
-
SHA256
c06a648685eb9410a0e93ce91a45c670e1ed1f76145587d2f4d8d0d06bad0444
-
SHA512
06c130d14edd95297428a63dd5c8604685feabbcff4e17e873e53ad5751be61167edc617577f8ea818d3aa7dfb8fb32dbdfacb75af69dfaebb8786de5b06cba5
-
SSDEEP
98304:0nRtkdrTLh98dVVn9qGCHx+esMpGttj9tfGeiwEp3N+VPDNAMJBLj7Ap+oRe9PzR:0xVVnmxo3tjv3Ep3Nu5AqBLW+oI
Static task
static1
Behavioral task
behavioral1
Sample
b779eef1b41acc4dd3f6b44faaf717d2_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
b779eef1b41acc4dd3f6b44faaf717d2_JaffaCakes118.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
b779eef1b41acc4dd3f6b44faaf717d2_JaffaCakes118.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Targets
-
-
Target
b779eef1b41acc4dd3f6b44faaf717d2_JaffaCakes118
-
Size
5.9MB
-
MD5
b779eef1b41acc4dd3f6b44faaf717d2
-
SHA1
74d24e0be677caa680186c890f560599570f7f3e
-
SHA256
c06a648685eb9410a0e93ce91a45c670e1ed1f76145587d2f4d8d0d06bad0444
-
SHA512
06c130d14edd95297428a63dd5c8604685feabbcff4e17e873e53ad5751be61167edc617577f8ea818d3aa7dfb8fb32dbdfacb75af69dfaebb8786de5b06cba5
-
SSDEEP
98304:0nRtkdrTLh98dVVn9qGCHx+esMpGttj9tfGeiwEp3N+VPDNAMJBLj7Ap+oRe9PzR:0xVVnmxo3tjv3Ep3Nu5AqBLW+oI
-
Checks if the Android device is rooted.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Acquires the wake lock
-
Queries information about active data network
-
Queries the mobile country code (MCC)
-
Reads information about phone network operator.
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Scheduled Task/Job
1Defense Evasion
Hide Artifacts
1Suppress Application Icon
1Virtualization/Sandbox Evasion
2System Checks
2