General
-
Target
4b02fe08b3053a774b94e09d39c65102_JaffaCakes118
-
Size
2.1MB
-
Sample
241016-cvagwssbqn
-
MD5
4b02fe08b3053a774b94e09d39c65102
-
SHA1
bd33ea48383001e960dfc9d683b90dac23beb44a
-
SHA256
0d634132ba38a82cebabd6ab3e695f80d8d537cf42ef70f232659e9a4d3f8896
-
SHA512
99970f7d67d6e3a19f4aca575bc40410952e41d5d63698268ea4b08d7f8681c16e6ed2954950c94ac879dd95aa5747c12e0d6baa095f72ee30ef21f7dcae76ae
-
SSDEEP
49152:UQ3eD3TRcoDDDBCIjeQ3A13a78dleGDlYl1aaeP:73e7lPppP3gKsleGBKaz
Static task
static1
Behavioral task
behavioral1
Sample
4b02fe08b3053a774b94e09d39c65102_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
FZ200DL.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral3
Sample
FZ200DL.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral4
Sample
FZ200DL.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Targets
-
-
Target
4b02fe08b3053a774b94e09d39c65102_JaffaCakes118
-
Size
2.1MB
-
MD5
4b02fe08b3053a774b94e09d39c65102
-
SHA1
bd33ea48383001e960dfc9d683b90dac23beb44a
-
SHA256
0d634132ba38a82cebabd6ab3e695f80d8d537cf42ef70f232659e9a4d3f8896
-
SHA512
99970f7d67d6e3a19f4aca575bc40410952e41d5d63698268ea4b08d7f8681c16e6ed2954950c94ac879dd95aa5747c12e0d6baa095f72ee30ef21f7dcae76ae
-
SSDEEP
49152:UQ3eD3TRcoDDDBCIjeQ3A13a78dleGDlYl1aaeP:73e7lPppP3gKsleGBKaz
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries the phone number (MSISDN for GSM devices)
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Listens for changes in the sensor environment (might be used to detect emulation)
-
-
-
Target
FZ200DL
-
Size
99KB
-
MD5
e8fbf92c750dbd6fb316be82a6b7b7ae
-
SHA1
2a6ae9568698807cacc8cf4349556446c996b136
-
SHA256
2a3cb93d0ca14a1d0b0820c2a26df502a461fb2546ef4587524087c130553f10
-
SHA512
7848191878b5b8ba2d5020c7be953e70ccc4d392d29e400a65a57cd3731604933125de1d81b3732d251b3450fd4766a814ccd01f3975beda2499a9ba585a26e0
-
SSDEEP
3072:O/UQ9RDR78j9tqyLm0NhjQOH4A2fra1m+91rc2LrJ2:2UQ9D78JoUpj/orah1rRU
Score1/10 -
MITRE ATT&CK Mobile v15
Defense Evasion
Execution Guardrails
1Geofencing
1Hide Artifacts
1User Evasion
1Virtualization/Sandbox Evasion
1System Checks
1