General
-
Target
fea1e14735da5e81fe858cd4ec54838d_JaffaCakes118
-
Size
9.6MB
-
Sample
240929-qs2egswekm
-
MD5
fea1e14735da5e81fe858cd4ec54838d
-
SHA1
d21b372f45b20f8767eebfe707f6008b75b68516
-
SHA256
88dd0c90c5a7198179305c330bee8d92fbf7bda3b7d7bc5555ece530f376c300
-
SHA512
3326ec450e232d58518664ede1a9f467d24ac3097500979d748c87d714edff6f8a007573bbbd60351e4457b03b4b6f1388fbe3b0b33ba8d8d129981272a47f61
-
SSDEEP
196608:ajKHEAh7j6Sn4CHQVdXGwCqp+Quk08r8TfM7wrC9F6G6LOP3QDiYkS:ajEpjTn4CHCSEp8nfM7wG6G6yP3/YkS
Static task
static1
Behavioral task
behavioral1
Sample
fea1e14735da5e81fe858cd4ec54838d_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Malware Config
Targets
-
-
Target
fea1e14735da5e81fe858cd4ec54838d_JaffaCakes118
-
Size
9.6MB
-
MD5
fea1e14735da5e81fe858cd4ec54838d
-
SHA1
d21b372f45b20f8767eebfe707f6008b75b68516
-
SHA256
88dd0c90c5a7198179305c330bee8d92fbf7bda3b7d7bc5555ece530f376c300
-
SHA512
3326ec450e232d58518664ede1a9f467d24ac3097500979d748c87d714edff6f8a007573bbbd60351e4457b03b4b6f1388fbe3b0b33ba8d8d129981272a47f61
-
SSDEEP
196608:ajKHEAh7j6Sn4CHQVdXGwCqp+Quk08r8TfM7wrC9F6G6LOP3QDiYkS:ajEpjTn4CHCSEp8nfM7wG6G6yP3/YkS
Score7/10-
Checks Android system properties for emulator presence.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries the phone number (MSISDN for GSM devices)
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the mobile country code (MCC)
-
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Virtualization/Sandbox Evasion
2System Checks
2