General
-
Target
bf131fe8e95bf133c521d13047b61b08_JaffaCakes118
-
Size
24.4MB
-
Sample
240824-vq7wpszhqb
-
MD5
bf131fe8e95bf133c521d13047b61b08
-
SHA1
d68308638f678e9ec01715e96c4d47f3b311d657
-
SHA256
36a990225799947f58ed6e72c3baeabe5b55942726ea9543b4deeb9adcd33fc6
-
SHA512
90ac76af1805cb801c3584fc4098b1f8caab3b5ce3686316de6d9c43100d3b8c846d53399f0972ff7c7161339dec721b97339b3694e1eead9a9bd655f112b3e4
-
SSDEEP
786432:A9HCWObG5N6uAnbljEkVfbWb7P3ANbPUVbnJ:A9HCWObWN6uANEQfMb3ANbyDJ
Behavioral task
behavioral1
Sample
bf131fe8e95bf133c521d13047b61b08_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Malware Config
Targets
-
-
Target
bf131fe8e95bf133c521d13047b61b08_JaffaCakes118
-
Size
24.4MB
-
MD5
bf131fe8e95bf133c521d13047b61b08
-
SHA1
d68308638f678e9ec01715e96c4d47f3b311d657
-
SHA256
36a990225799947f58ed6e72c3baeabe5b55942726ea9543b4deeb9adcd33fc6
-
SHA512
90ac76af1805cb801c3584fc4098b1f8caab3b5ce3686316de6d9c43100d3b8c846d53399f0972ff7c7161339dec721b97339b3694e1eead9a9bd655f112b3e4
-
SSDEEP
786432:A9HCWObG5N6uAnbljEkVfbWb7P3ANbPUVbnJ:A9HCWObWN6uANEQfMb3ANbyDJ
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Listens for changes in the sensor environment (might be used to detect emulation)
-
MITRE ATT&CK Mobile v15
Defense Evasion
Execution Guardrails
1Geofencing
1Hide Artifacts
1User Evasion
1Virtualization/Sandbox Evasion
2System Checks
2