General
-
Target
eeb35da8efc74e14d582191de6d9d2b4_JaffaCakes118
-
Size
23.1MB
-
Sample
240921-adzz4swakc
-
MD5
eeb35da8efc74e14d582191de6d9d2b4
-
SHA1
bb2ae4356ca78f3e20801d1aa7b8c78e02f609cc
-
SHA256
32817e6d4ab79502ffa02f1e84c9914dc3c901facc76567566bb177c8cdcead6
-
SHA512
7b81e6df7aee1fda53f2b181fa62e1effb417d0f8c47eacf60d37cce275c724af9de307e6b5b56b8f02546a5f3c508c10b7f7f035b24eac7be061c443cdeac01
-
SSDEEP
393216:u7FtpNZsDzGGj25p97ajUYlbCHkAVpFIQv4Os1rgnpHh+FJhlsxbjCTASe+oqNhg:sPNZsDzpG9PxH/SUR8PGxRF+oy2
Behavioral task
behavioral1
Sample
eeb35da8efc74e14d582191de6d9d2b4_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
eeb35da8efc74e14d582191de6d9d2b4_JaffaCakes118.apk
Resource
android-x64-20240624-en
Malware Config
Targets
-
-
Target
eeb35da8efc74e14d582191de6d9d2b4_JaffaCakes118
-
Size
23.1MB
-
MD5
eeb35da8efc74e14d582191de6d9d2b4
-
SHA1
bb2ae4356ca78f3e20801d1aa7b8c78e02f609cc
-
SHA256
32817e6d4ab79502ffa02f1e84c9914dc3c901facc76567566bb177c8cdcead6
-
SHA512
7b81e6df7aee1fda53f2b181fa62e1effb417d0f8c47eacf60d37cce275c724af9de307e6b5b56b8f02546a5f3c508c10b7f7f035b24eac7be061c443cdeac01
-
SSDEEP
393216:u7FtpNZsDzGGj25p97ajUYlbCHkAVpFIQv4Os1rgnpHh+FJhlsxbjCTASe+oqNhg:sPNZsDzpG9PxH/SUR8PGxRF+oy2
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the mobile country code (MCC)
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Virtualization/Sandbox Evasion
2System Checks
2