General
-
Target
bd3f2adb4ae31aeeff3c09fcd12e03e5_JaffaCakes118
-
Size
9.3MB
-
Sample
240823-1gcxvsyana
-
MD5
bd3f2adb4ae31aeeff3c09fcd12e03e5
-
SHA1
5609560a00fc9b3c70dc8370abe809efe2c7ceea
-
SHA256
1ede8132af2e6ece7aae3782f754cc454f725bbc85fd17a93bd6eabd40688443
-
SHA512
6a98d238a6678475a68d85df738dc084e1e747b3b7d45c6fd0c0c7c756ccb323cf9deea3ee8093d9f1ada8458a8ccaa0463083ce7688667afb496437bca0ec37
-
SSDEEP
196608:W+eJROtGaDdYSSU3l488Gts7gdmfFCGjbL/b26KnQOe:W+cCGKYYC1Gts/Ekfj2kOe
Static task
static1
Behavioral task
behavioral1
Sample
bd3f2adb4ae31aeeff3c09fcd12e03e5_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
bd3f2adb4ae31aeeff3c09fcd12e03e5_JaffaCakes118.apk
Resource
android-x64-20240624-en
Malware Config
Targets
-
-
Target
bd3f2adb4ae31aeeff3c09fcd12e03e5_JaffaCakes118
-
Size
9.3MB
-
MD5
bd3f2adb4ae31aeeff3c09fcd12e03e5
-
SHA1
5609560a00fc9b3c70dc8370abe809efe2c7ceea
-
SHA256
1ede8132af2e6ece7aae3782f754cc454f725bbc85fd17a93bd6eabd40688443
-
SHA512
6a98d238a6678475a68d85df738dc084e1e747b3b7d45c6fd0c0c7c756ccb323cf9deea3ee8093d9f1ada8458a8ccaa0463083ce7688667afb496437bca0ec37
-
SSDEEP
196608:W+eJROtGaDdYSSU3l488Gts7gdmfFCGjbL/b26KnQOe:W+cCGKYYC1Gts/Ekfj2kOe
-
Checks Android system properties for emulator presence.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current nearby Wi-Fi networks
Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.
-
Checks the application is allowed to request package installs through the package installer
Checks the application is allowed to install additional applications (Might try to install applications from unknown sources).
-
Domain associated with commercial stalkerware software, includes indicators from echap.eu.org
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the mobile country code (MCC)
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-
Requests allowing to install additional applications from unknown sources.
-
Checks the presence of a debugger
-
Listens for changes in the sensor environment (might be used to detect emulation)
-
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Hide Artifacts
1User Evasion
1Subvert Trust Controls
2Code Signing Policy Modification
2Virtualization/Sandbox Evasion
3System Checks
3