General
-
Target
bdbd84436cc1689afae8f2a57e42ed2b_JaffaCakes118
-
Size
17.2MB
-
Sample
240824-bs5dtazfpl
-
MD5
bdbd84436cc1689afae8f2a57e42ed2b
-
SHA1
fa2a3eeecda37831d0558a7abd8326247e5d8ae8
-
SHA256
15795d89207dde3b96a5a7ec8602e76a8f0ab54ee4097d8bfb39bd2e227d3f41
-
SHA512
99da388ba97679d04c73e5d572068d3941f1e266923ac1da5166be19082540f8618c16be8d467189cbc2749c0be28218223e42894cc8d7a51eceb4d45541bc58
-
SSDEEP
393216:wYmUW+u1oyMiVp5AQjMpGoo0aVKSqc+EftB5sPjdtAl1J0:9mUlyoyMiJF31VKZqUXF
Static task
static1
Behavioral task
behavioral1
Sample
bdbd84436cc1689afae8f2a57e42ed2b_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Malware Config
Targets
-
-
Target
bdbd84436cc1689afae8f2a57e42ed2b_JaffaCakes118
-
Size
17.2MB
-
MD5
bdbd84436cc1689afae8f2a57e42ed2b
-
SHA1
fa2a3eeecda37831d0558a7abd8326247e5d8ae8
-
SHA256
15795d89207dde3b96a5a7ec8602e76a8f0ab54ee4097d8bfb39bd2e227d3f41
-
SHA512
99da388ba97679d04c73e5d572068d3941f1e266923ac1da5166be19082540f8618c16be8d467189cbc2749c0be28218223e42894cc8d7a51eceb4d45541bc58
-
SSDEEP
393216:wYmUW+u1oyMiVp5AQjMpGoo0aVKSqc+EftB5sPjdtAl1J0:9mUlyoyMiJF31VKZqUXF
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries the phone number (MSISDN for GSM devices)
-
Acquires the wake lock
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Checks the presence of a debugger
-
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Virtualization/Sandbox Evasion
2System Checks
2