General
-
Target
371581702729313f8c3d11f023e76905_JaffaCakes118
-
Size
13.1MB
-
Sample
241011-182ejaxbpe
-
MD5
371581702729313f8c3d11f023e76905
-
SHA1
7f0ea64b85b48b78269fa8420dd3de3faf1266e8
-
SHA256
4f0d67d4775cb518be89b133afad05933c14f5fed26e24dd52fe9e96fe163874
-
SHA512
fdbc7d274579203a7f1710467b2655a402ba1211bb89aee6b57a71da76c081dde35f3150fb288e1776642399394c2aa7179e6cbf5601db09b9def67a4581c0e1
-
SSDEEP
393216:VB8YqBV+Kf6tf32tSJEdu/qaFnFeL2szz:ryVDf653WUFUz
Static task
static1
Behavioral task
behavioral1
Sample
371581702729313f8c3d11f023e76905_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
371581702729313f8c3d11f023e76905_JaffaCakes118.apk
Resource
android-x64-20240624-en
Malware Config
Targets
-
-
Target
371581702729313f8c3d11f023e76905_JaffaCakes118
-
Size
13.1MB
-
MD5
371581702729313f8c3d11f023e76905
-
SHA1
7f0ea64b85b48b78269fa8420dd3de3faf1266e8
-
SHA256
4f0d67d4775cb518be89b133afad05933c14f5fed26e24dd52fe9e96fe163874
-
SHA512
fdbc7d274579203a7f1710467b2655a402ba1211bb89aee6b57a71da76c081dde35f3150fb288e1776642399394c2aa7179e6cbf5601db09b9def67a4581c0e1
-
SSDEEP
393216:VB8YqBV+Kf6tf32tSJEdu/qaFnFeL2szz:ryVDf653WUFUz
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Acquires the wake lock
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Virtualization/Sandbox Evasion
1System Checks
1