General
-
Target
573a18635db094cdd55f67e0a49b34a4_JaffaCakes118
-
Size
19.1MB
-
Sample
241018-nqrq6axdmj
-
MD5
573a18635db094cdd55f67e0a49b34a4
-
SHA1
1e04ffb53b2c7d82899bbc73fed69566f61c94db
-
SHA256
f0be31e1e3368c703e7a0c36af9265b80019edd780bd119a4dea2273e719d8db
-
SHA512
cd481e77019fc035a733a841d7fb8a2420a4066f4599c64692e5e76033f57d3c348bf25d793a8275b89ea797d037f1ee1417236daf1046e028d77a92868f0b30
-
SSDEEP
393216:NRZa5CY6AzPKd1+ilqhAENrF8hGSqF0VYJ7sHUBBRjYVFsp9:Nza5C0Pe+uajNB8ESqF0VYB/vRQu
Static task
static1
Behavioral task
behavioral1
Sample
573a18635db094cdd55f67e0a49b34a4_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Malware Config
Targets
-
-
Target
573a18635db094cdd55f67e0a49b34a4_JaffaCakes118
-
Size
19.1MB
-
MD5
573a18635db094cdd55f67e0a49b34a4
-
SHA1
1e04ffb53b2c7d82899bbc73fed69566f61c94db
-
SHA256
f0be31e1e3368c703e7a0c36af9265b80019edd780bd119a4dea2273e719d8db
-
SHA512
cd481e77019fc035a733a841d7fb8a2420a4066f4599c64692e5e76033f57d3c348bf25d793a8275b89ea797d037f1ee1417236daf1046e028d77a92868f0b30
-
SSDEEP
393216:NRZa5CY6AzPKd1+ilqhAENrF8hGSqF0VYJ7sHUBBRjYVFsp9:Nza5C0Pe+uajNB8ESqF0VYB/vRQu
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Reads information about phone network operator.
-
Checks the presence of a debugger
-
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Virtualization/Sandbox Evasion
2System Checks
2