General
-
Target
52b859941aeae463735336b3f243ccb2_JaffaCakes118
-
Size
19.0MB
-
Sample
241017-vewdjavgrg
-
MD5
52b859941aeae463735336b3f243ccb2
-
SHA1
29c0c6fd81f191cf73e539d7fe0c4fccf83a6b0b
-
SHA256
abf89b6c6e932dd3c580b43aee510008b933b8eb0283d386814345ded146440f
-
SHA512
d44390c4e8aeac793607bddaa415ab89cf28fdfe8b3d7ac18e89aa01f7c481e602477d6f4ffa9a84f1213be1398c474bbf03bf0c943bcb0d3afe4180aa6f46f9
-
SSDEEP
393216:1sQ3nJGc8Kvf16RLnzpeFFUS0HqmKnNeQ9O5ql20CParw8IXdxxtHcefjxBzvS:WQ3nJGcXvNULNe8zHWzI5f/Parw8GAWs
Static task
static1
Behavioral task
behavioral1
Sample
52b859941aeae463735336b3f243ccb2_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Malware Config
Targets
-
-
Target
52b859941aeae463735336b3f243ccb2_JaffaCakes118
-
Size
19.0MB
-
MD5
52b859941aeae463735336b3f243ccb2
-
SHA1
29c0c6fd81f191cf73e539d7fe0c4fccf83a6b0b
-
SHA256
abf89b6c6e932dd3c580b43aee510008b933b8eb0283d386814345ded146440f
-
SHA512
d44390c4e8aeac793607bddaa415ab89cf28fdfe8b3d7ac18e89aa01f7c481e602477d6f4ffa9a84f1213be1398c474bbf03bf0c943bcb0d3afe4180aa6f46f9
-
SSDEEP
393216:1sQ3nJGc8Kvf16RLnzpeFFUS0HqmKnNeQ9O5ql20CParw8IXdxxtHcefjxBzvS:WQ3nJGcXvNULNe8zHWzI5f/Parw8GAWs
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Virtualization/Sandbox Evasion
1System Checks
1