General
-
Target
db4f17529b419b665b7e0c8404bb8e5f_JaffaCakes118
-
Size
20.2MB
-
Sample
240911-14cwdaweje
-
MD5
db4f17529b419b665b7e0c8404bb8e5f
-
SHA1
f79f8bad1e521ce74a53695e59f41b8d61c3ee98
-
SHA256
3a7be3619268ada968526137eb4afd9373ae60be134236ede912570ef372c9db
-
SHA512
3d63d0945fd55e7a6d8cba8d05d5405a4f3e7c79c87a084309576e6cb42fbe1008c209f3101bae36ad9841d98dca60b9e22c354908c9378e743d3cad9c58e786
-
SSDEEP
393216:5RhZgk4vIIP17c7RoUYerN830JuS7pUcxKaf+OnXJ4Bxbkm3eOwt:5R/34vzICUnrLmQdnaxWjt
Static task
static1
Behavioral task
behavioral1
Sample
db4f17529b419b665b7e0c8404bb8e5f_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
db4f17529b419b665b7e0c8404bb8e5f_JaffaCakes118.apk
Resource
android-33-x64-arm64-20240910-en
Malware Config
Targets
-
-
Target
db4f17529b419b665b7e0c8404bb8e5f_JaffaCakes118
-
Size
20.2MB
-
MD5
db4f17529b419b665b7e0c8404bb8e5f
-
SHA1
f79f8bad1e521ce74a53695e59f41b8d61c3ee98
-
SHA256
3a7be3619268ada968526137eb4afd9373ae60be134236ede912570ef372c9db
-
SHA512
3d63d0945fd55e7a6d8cba8d05d5405a4f3e7c79c87a084309576e6cb42fbe1008c209f3101bae36ad9841d98dca60b9e22c354908c9378e743d3cad9c58e786
-
SSDEEP
393216:5RhZgk4vIIP17c7RoUYerN830JuS7pUcxKaf+OnXJ4Bxbkm3eOwt:5R/34vzICUnrLmQdnaxWjt
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Listens for changes in the sensor environment (might be used to detect emulation)
-
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Execution Guardrails
1Geofencing
1Hide Artifacts
1User Evasion
1Virtualization/Sandbox Evasion
1System Checks
1