General
-
Target
314985092f13d343678ddbbfac9f33b0_JaffaCakes118
-
Size
2.2MB
-
Sample
241010-wxxvraverp
-
MD5
314985092f13d343678ddbbfac9f33b0
-
SHA1
db17dd599b08fdce0ef702289b58b2058fd3ca14
-
SHA256
1e70d1f1efb4619d7763210a634b882d3b442fd3eb9e389810b949017c2760e3
-
SHA512
19cc5ef1da27ed0c3baab0deee341c00a5cb3093b071cdd952e822f476ba0fcd346a7e92b8609f8cfae1dffc314b9c8e69f46c817bd1174bc2f6ed0bb9961103
-
SSDEEP
49152:YXqWrBnmSHH7fhRocjepNTY2Rz5uFrI6P7EsnBnmiW:YXZBmSHH7fLocj+TY2buFrBBmiW
Static task
static1
Behavioral task
behavioral1
Sample
314985092f13d343678ddbbfac9f33b0_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
314985092f13d343678ddbbfac9f33b0_JaffaCakes118.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
314985092f13d343678ddbbfac9f33b0_JaffaCakes118.apk
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral4
Sample
polyvideo.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral5
Sample
polyvideo.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral6
Sample
polyvideo.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Targets
-
-
Target
314985092f13d343678ddbbfac9f33b0_JaffaCakes118
-
Size
2.2MB
-
MD5
314985092f13d343678ddbbfac9f33b0
-
SHA1
db17dd599b08fdce0ef702289b58b2058fd3ca14
-
SHA256
1e70d1f1efb4619d7763210a634b882d3b442fd3eb9e389810b949017c2760e3
-
SHA512
19cc5ef1da27ed0c3baab0deee341c00a5cb3093b071cdd952e822f476ba0fcd346a7e92b8609f8cfae1dffc314b9c8e69f46c817bd1174bc2f6ed0bb9961103
-
SSDEEP
49152:YXqWrBnmSHH7fhRocjepNTY2Rz5uFrI6P7EsnBnmiW:YXZBmSHH7fLocj+TY2buFrBBmiW
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries the mobile country code (MCC)
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
-
-
Target
polyvideo.apk
-
Size
417KB
-
MD5
99c506d3910bc12518e6018fe87940d5
-
SHA1
f423b8797862eb17a7df018fe03c7a607947dfff
-
SHA256
f4050b9986beff80b7800ce750ce6d39051e597f024c86f4ea33e3016f61ce65
-
SHA512
05aa3cad4ab98b79fd1451a3b165cb2083956ee82c3727ac49b5d7a16759a6aac3473ac238155bc94333ab146d451ef449ba081fccd0572655ce32bfb016c916
-
SSDEEP
12288:IPP8mCGIWCWAbQLBca09eT+u9iXLP0hf9dn:IPP8nWCWrBc34T+D8hFdn
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about active data network
-
Queries the mobile country code (MCC)
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Hide Artifacts
1Suppress Application Icon
1Virtualization/Sandbox Evasion
2System Checks
2