General
-
Target
d200551bbfd6db8b8f54da86c7f53a25_JaffaCakes118
-
Size
10.1MB
-
Sample
240907-qcaltsxglf
-
MD5
d200551bbfd6db8b8f54da86c7f53a25
-
SHA1
d8da31953aa5e03c1878491c99931d890af1b7f2
-
SHA256
e602c2d11824aa81798ee02c31206c6be769861a61a78aa511131acccca1a276
-
SHA512
9c75124701e49f990ea82508b3d82cac64c99e0fd0e49b96416f8f776fe694a0bf3210180c2869ad592e1f58eff66a44e42e3db4539c11d14660342c4bc20a8d
-
SSDEEP
196608:iiyAw4tE4Qz23gxw8Rim4zqg36Av9pNGkqtPr+1zD275jdhiU1rrsOMgXjW:iiyARiUQxw84Zqg36Av9zStj+JDy5jdu
Behavioral task
behavioral1
Sample
d200551bbfd6db8b8f54da86c7f53a25_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
d200551bbfd6db8b8f54da86c7f53a25_JaffaCakes118.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
d200551bbfd6db8b8f54da86c7f53a25_JaffaCakes118.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Targets
-
-
Target
d200551bbfd6db8b8f54da86c7f53a25_JaffaCakes118
-
Size
10.1MB
-
MD5
d200551bbfd6db8b8f54da86c7f53a25
-
SHA1
d8da31953aa5e03c1878491c99931d890af1b7f2
-
SHA256
e602c2d11824aa81798ee02c31206c6be769861a61a78aa511131acccca1a276
-
SHA512
9c75124701e49f990ea82508b3d82cac64c99e0fd0e49b96416f8f776fe694a0bf3210180c2869ad592e1f58eff66a44e42e3db4539c11d14660342c4bc20a8d
-
SSDEEP
196608:iiyAw4tE4Qz23gxw8Rim4zqg36Av9pNGkqtPr+1zD275jdhiU1rrsOMgXjW:iiyARiUQxw84Zqg36Av9zStj+JDy5jdu
-
Checks Android system properties for emulator presence.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Acquires the wake lock
-
Queries information about active data network
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Execution Guardrails
1Geofencing
1Virtualization/Sandbox Evasion
2System Checks
2