Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
27f277eae2ac1f2337eeba16c4e4f2fa_JaffaCakes118
-
Size
6.3MB
-
Sample
241009-a4tk1syhja
-
MD5
27f277eae2ac1f2337eeba16c4e4f2fa
-
SHA1
88de663699cdb0764e6e3882bbdfe5bec545ad55
-
SHA256
ee8325e4b62aac55bafc7d9ac1cd57573152f77595b33cc20b1bad1d08fb4027
-
SHA512
e704531ddc2a295c641d8bb053dea1a27d1112d29cbe64d84d6c84c027f0ba1ee40d4ec11b3a04bb5d46fd02e25391fa1a8ed81d0e839c77f1a7f8cf02c89529
-
SSDEEP
196608:JmxH1eWhIxRNPNyZjYMWRyEaM9GFSE6Fzyi5bDo/:011thIF6YPhaM9GFSEH/
Static task
static1
Behavioral task
behavioral1
Sample
27f277eae2ac1f2337eeba16c4e4f2fa_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Malware Config
Targets
-
-
Target
27f277eae2ac1f2337eeba16c4e4f2fa_JaffaCakes118
-
Size
6.3MB
-
MD5
27f277eae2ac1f2337eeba16c4e4f2fa
-
SHA1
88de663699cdb0764e6e3882bbdfe5bec545ad55
-
SHA256
ee8325e4b62aac55bafc7d9ac1cd57573152f77595b33cc20b1bad1d08fb4027
-
SHA512
e704531ddc2a295c641d8bb053dea1a27d1112d29cbe64d84d6c84c027f0ba1ee40d4ec11b3a04bb5d46fd02e25391fa1a8ed81d0e839c77f1a7f8cf02c89529
-
SSDEEP
196608:JmxH1eWhIxRNPNyZjYMWRyEaM9GFSE6Fzyi5bDo/:011thIF6YPhaM9GFSEH/
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current nearby Wi-Fi networks
Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.
-
Reads the content of photos stored on the user's device.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Reads information about phone network operator.
-
MITRE ATT&CK Mobile v15
Defense Evasion
Execution Guardrails
1Geofencing
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Discovery
Location Tracking
1Process Discovery
1Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
1System Network Connections Discovery
3