General
-
Target
ebf25c3943ba14cf347b883bc05d70fc_JaffaCakes118
-
Size
15.5MB
-
Sample
240919-w5564atfpr
-
MD5
ebf25c3943ba14cf347b883bc05d70fc
-
SHA1
2579a5b86c70c30de1f13db2357c5cbab396e941
-
SHA256
dd3442a269fbd53de977b47103fb9af8332e6b2727becbe66041f27e14d3486f
-
SHA512
4090aade6b870fa888faf84cbcd1264cd388904bf67442942a92c2efe08f4c9981cdb0fec1d3eae6baa170ccd5d198190dc6e8361c98b5347e9fade1d46b2bfd
-
SSDEEP
393216:tuY0fY/QmvY8L5gTI60ZiQwslZzbDG69+xDI6Hdx2ka+uhQ:tu1qQmvATyLrlZzWLjHj2xe
Static task
static1
Behavioral task
behavioral1
Sample
ebf25c3943ba14cf347b883bc05d70fc_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Malware Config
Targets
-
-
Target
ebf25c3943ba14cf347b883bc05d70fc_JaffaCakes118
-
Size
15.5MB
-
MD5
ebf25c3943ba14cf347b883bc05d70fc
-
SHA1
2579a5b86c70c30de1f13db2357c5cbab396e941
-
SHA256
dd3442a269fbd53de977b47103fb9af8332e6b2727becbe66041f27e14d3486f
-
SHA512
4090aade6b870fa888faf84cbcd1264cd388904bf67442942a92c2efe08f4c9981cdb0fec1d3eae6baa170ccd5d198190dc6e8361c98b5347e9fade1d46b2bfd
-
SSDEEP
393216:tuY0fY/QmvY8L5gTI60ZiQwslZzbDG69+xDI6Hdx2ka+uhQ:tu1qQmvATyLrlZzWLjHj2xe
Score7/10-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Listens for changes in the sensor environment (might be used to detect emulation)
-
MITRE ATT&CK Mobile v15
Defense Evasion
Execution Guardrails
1Geofencing
1Hide Artifacts
1User Evasion
1Virtualization/Sandbox Evasion
1System Checks
1