General
-
Target
eaf57e63a2a6fc35afbd07bba8e914d6_JaffaCakes118
-
Size
19.7MB
-
Sample
240919-kjddeazbnb
-
MD5
eaf57e63a2a6fc35afbd07bba8e914d6
-
SHA1
c1c7403190c46d4ad930fb992870e4d8a4c4e2d4
-
SHA256
9b7485d15b34c9ce1e6e9de26365f3d0a1d632f16dc6adde870a544612642d97
-
SHA512
104e6def9ce633fddbb9b2ed5cc38bb623a5c4ee6a1682c40f8d027a8ecb6ea5035c63239f4fe96f4ccb6e06861618e6c1f9059b1ae30bfbdcf63e04cbe80a2f
-
SSDEEP
393216:5CruAyGnVBKYum2Tgg54n+CnajCzF2ggr0ofoSNPYHVpdICWHdgJm6:Mr7yGn/ET0+3jCpM6SFYHndxWHdgw6
Static task
static1
Behavioral task
behavioral1
Sample
eaf57e63a2a6fc35afbd07bba8e914d6_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Malware Config
Targets
-
-
Target
eaf57e63a2a6fc35afbd07bba8e914d6_JaffaCakes118
-
Size
19.7MB
-
MD5
eaf57e63a2a6fc35afbd07bba8e914d6
-
SHA1
c1c7403190c46d4ad930fb992870e4d8a4c4e2d4
-
SHA256
9b7485d15b34c9ce1e6e9de26365f3d0a1d632f16dc6adde870a544612642d97
-
SHA512
104e6def9ce633fddbb9b2ed5cc38bb623a5c4ee6a1682c40f8d027a8ecb6ea5035c63239f4fe96f4ccb6e06861618e6c1f9059b1ae30bfbdcf63e04cbe80a2f
-
SSDEEP
393216:5CruAyGnVBKYum2Tgg54n+CnajCzF2ggr0ofoSNPYHVpdICWHdgJm6:Mr7yGn/ET0+3jCpM6SFYHndxWHdgw6
-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current nearby Wi-Fi networks
Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the mobile country code (MCC)
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Execution Guardrails
1Geofencing
1Foreground Persistence
1Virtualization/Sandbox Evasion
2System Checks
2