General
-
Target
fd66ce40e73dbfe2a1f6a718c5ca30da_JaffaCakes118
-
Size
4.7MB
-
Sample
240928-3z9ewsvcjf
-
MD5
fd66ce40e73dbfe2a1f6a718c5ca30da
-
SHA1
696431ac145a50da1b1060639d7908c682f134c8
-
SHA256
b0ac55805196efd6af8d21642c3dd81ea0900847c2544404292b4bfd1ce84fa3
-
SHA512
371c38332a1ba8e1ea8224c1d2f47f14df4e8c9f78c981aacb7fa36496e7dbe0ea06e369f9236fa61b1588f0ef5b9784be1583872df4ef6b7c9504d338c00fe3
-
SSDEEP
98304:hN23CGCNT1OO6CuFJaylF8ZCCfxOk13C3cFR+ARW5yYbsae+P7Wv/2TrJ1ebpFA:hI3C/NTt6HVlCZCQxERARW5galPi2TFP
Static task
static1
Behavioral task
behavioral1
Sample
fd66ce40e73dbfe2a1f6a718c5ca30da_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
fd66ce40e73dbfe2a1f6a718c5ca30da_JaffaCakes118.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
fd66ce40e73dbfe2a1f6a718c5ca30da_JaffaCakes118.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Targets
-
-
Target
fd66ce40e73dbfe2a1f6a718c5ca30da_JaffaCakes118
-
Size
4.7MB
-
MD5
fd66ce40e73dbfe2a1f6a718c5ca30da
-
SHA1
696431ac145a50da1b1060639d7908c682f134c8
-
SHA256
b0ac55805196efd6af8d21642c3dd81ea0900847c2544404292b4bfd1ce84fa3
-
SHA512
371c38332a1ba8e1ea8224c1d2f47f14df4e8c9f78c981aacb7fa36496e7dbe0ea06e369f9236fa61b1588f0ef5b9784be1583872df4ef6b7c9504d338c00fe3
-
SSDEEP
98304:hN23CGCNT1OO6CuFJaylF8ZCCfxOk13C3cFR+ARW5yYbsae+P7Wv/2TrJ1ebpFA:hI3C/NTt6HVlCZCQxERARW5galPi2TFP
-
Hydra payload
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Queries information about active data network
-
Queries the mobile country code (MCC)
-
Reads information about phone network operator.
-