General
-
Target
c76066057ed6967b87a64ecf8bcf24a3_JaffaCakes118
-
Size
18.8MB
-
Sample
240828-wp8x2s1ckk
-
MD5
c76066057ed6967b87a64ecf8bcf24a3
-
SHA1
f498f649e7abdb9f4e66a5277f6e1d3f94dd1750
-
SHA256
e72f0e9baa5af494db8cc3c60a7f238fa6235539ece6d40d806674e7d62aeb47
-
SHA512
e86d0b60b215ad7378a41658e21a074f90f811964e3d122ee67f94c4e97c5446f4f190950142e5769af6c821e78a2ddb681b0efb94bcd5bbc36e6f0b8b0849e5
-
SSDEEP
393216:0+hzhBiypxiyjVgjnsFRrb2IW2UTyanHAGnbe805CW7qL8+w65hZvQ1:Zzvi6xJgsvPk2UTlngGnba5/X+wY/Q1
Static task
static1
Behavioral task
behavioral1
Sample
c76066057ed6967b87a64ecf8bcf24a3_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
c76066057ed6967b87a64ecf8bcf24a3_JaffaCakes118.apk
Resource
android-33-x64-arm64-20240624-en
Malware Config
Targets
-
-
Target
c76066057ed6967b87a64ecf8bcf24a3_JaffaCakes118
-
Size
18.8MB
-
MD5
c76066057ed6967b87a64ecf8bcf24a3
-
SHA1
f498f649e7abdb9f4e66a5277f6e1d3f94dd1750
-
SHA256
e72f0e9baa5af494db8cc3c60a7f238fa6235539ece6d40d806674e7d62aeb47
-
SHA512
e86d0b60b215ad7378a41658e21a074f90f811964e3d122ee67f94c4e97c5446f4f190950142e5769af6c821e78a2ddb681b0efb94bcd5bbc36e6f0b8b0849e5
-
SSDEEP
393216:0+hzhBiypxiyjVgjnsFRrb2IW2UTyanHAGnbe805CW7qL8+w65hZvQ1:Zzvi6xJgsvPk2UTlngGnba5/X+wY/Q1
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current nearby Wi-Fi networks
Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.
-
Queries the phone number (MSISDN for GSM devices)
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the mobile country code (MCC)
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Listens for changes in the sensor environment (might be used to detect emulation)
-
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Hide Artifacts
1User Evasion
1Virtualization/Sandbox Evasion
1System Checks
1