General
-
Target
6fb4d640fd9021d43d3e952be9118888_JaffaCakes118
-
Size
1.9MB
-
Sample
241023-s784zszfkq
-
MD5
6fb4d640fd9021d43d3e952be9118888
-
SHA1
6bb5ac29eaa12991655c67c0b133f0de547b716b
-
SHA256
0ccf9cfae60602b20c679ad8d56cc14f94ebf50aed389ef9db8a86e717ed76ea
-
SHA512
004c3bab57a2081748ece4e0a78cab2c7cb2da4cc78f78a3dd63eb3929432233cf4843a5313d87f7504f7cd4fd80b5953e9ceb302e11b1bc954d875f498a6fcb
-
SSDEEP
49152:+qq3L9SshzzJ+RC/nvL9OWY5Bp7UWucfj06:+qq3LnzzBvhOWgn7/u2j7
Static task
static1
Behavioral task
behavioral1
Sample
6fb4d640fd9021d43d3e952be9118888_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
6fb4d640fd9021d43d3e952be9118888_JaffaCakes118.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
6fb4d640fd9021d43d3e952be9118888_JaffaCakes118.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Targets
-
-
Target
6fb4d640fd9021d43d3e952be9118888_JaffaCakes118
-
Size
1.9MB
-
MD5
6fb4d640fd9021d43d3e952be9118888
-
SHA1
6bb5ac29eaa12991655c67c0b133f0de547b716b
-
SHA256
0ccf9cfae60602b20c679ad8d56cc14f94ebf50aed389ef9db8a86e717ed76ea
-
SHA512
004c3bab57a2081748ece4e0a78cab2c7cb2da4cc78f78a3dd63eb3929432233cf4843a5313d87f7504f7cd4fd80b5953e9ceb302e11b1bc954d875f498a6fcb
-
SSDEEP
49152:+qq3L9SshzzJ+RC/nvL9OWY5Bp7UWucfj06:+qq3LnzzBvhOWgn7/u2j7
-
Checks if the Android device is rooted.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries the phone number (MSISDN for GSM devices)
-
Acquires the wake lock
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the mobile country code (MCC)
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Virtualization/Sandbox Evasion
2System Checks
2