General
-
Target
cfc8f82fc224bf7098bc6eb9470cf105_JaffaCakes118
-
Size
9.1MB
-
Sample
240906-r5zxvssgle
-
MD5
cfc8f82fc224bf7098bc6eb9470cf105
-
SHA1
2c800f72d2595c69d28dbe2f78cb449681161ee9
-
SHA256
b5d12962c8519f2aae18709ad0e13a13070d3a296667f48cd2a72ceea3e99131
-
SHA512
c585f5643af9b9c7a3195da6eb046517a77043e09a9cf568408ca43cfec4f31c6478c2704f7f0e03b0efed75933a6e47977555d9aa6c637defdce78c99b33e59
-
SSDEEP
196608:7F0vQxpCdg6Yv5m5ev85CHFAYQCm31gyDyXXtMkGejX:7FDrCs5m5evYCHFkFtIXtlGA
Static task
static1
Behavioral task
behavioral1
Sample
cfc8f82fc224bf7098bc6eb9470cf105_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
cfc8f82fc224bf7098bc6eb9470cf105_JaffaCakes118.apk
Resource
android-33-x64-arm64-20240910-en
Malware Config
Targets
-
-
Target
cfc8f82fc224bf7098bc6eb9470cf105_JaffaCakes118
-
Size
9.1MB
-
MD5
cfc8f82fc224bf7098bc6eb9470cf105
-
SHA1
2c800f72d2595c69d28dbe2f78cb449681161ee9
-
SHA256
b5d12962c8519f2aae18709ad0e13a13070d3a296667f48cd2a72ceea3e99131
-
SHA512
c585f5643af9b9c7a3195da6eb046517a77043e09a9cf568408ca43cfec4f31c6478c2704f7f0e03b0efed75933a6e47977555d9aa6c637defdce78c99b33e59
-
SSDEEP
196608:7F0vQxpCdg6Yv5m5ev85CHFAYQCm31gyDyXXtMkGejX:7FDrCs5m5evYCHFkFtIXtlGA
-
Checks if the Android device is rooted.
-
Checks known Qemu files.
Checks for known Qemu files that exist on Android virtual device images.
-
Checks known Qemu pipes.
Checks for known pipes used by the Android emulator to communicate with the host.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries the phone number (MSISDN for GSM devices)
-
Domain associated with commercial stalkerware software, includes indicators from echap.eu.org
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the mobile country code (MCC)
-
Reads information about phone network operator.
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Execution Guardrails
1Geofencing
1Foreground Persistence
1Virtualization/Sandbox Evasion
4System Checks
4