General
-
Target
6fdf34d17f3a3775b82c1dd5fdf01db7_JaffaCakes118
-
Size
2.2MB
-
Sample
241023-tz3snssanj
-
MD5
6fdf34d17f3a3775b82c1dd5fdf01db7
-
SHA1
38fe5652102703168d23ed58db9f9f9846df6214
-
SHA256
ffddef5f1b6d3e9d2fa6da987fbc78c53adb21b91528b0bd2490b7ef29f0bca7
-
SHA512
790bb21b90a530437c3f758dc82b255cfeaa9c0242f5c7d9d6609e9057ce7ff9f0145933fc979ae01cb956547a20147ba81d3905d26484918bebbe2c49dd70bb
-
SSDEEP
49152:APoTtBnmh+HpT7E7WkTcTJLTna1YiYNK4ziBBnmPJ:APatBmh+HpTYpTuLTMHYNKkeBmPJ
Static task
static1
Behavioral task
behavioral1
Sample
6fdf34d17f3a3775b82c1dd5fdf01db7_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
6fdf34d17f3a3775b82c1dd5fdf01db7_JaffaCakes118.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
6fdf34d17f3a3775b82c1dd5fdf01db7_JaffaCakes118.apk
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral4
Sample
polyvideo.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral5
Sample
polyvideo.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral6
Sample
polyvideo.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Targets
-
-
Target
6fdf34d17f3a3775b82c1dd5fdf01db7_JaffaCakes118
-
Size
2.2MB
-
MD5
6fdf34d17f3a3775b82c1dd5fdf01db7
-
SHA1
38fe5652102703168d23ed58db9f9f9846df6214
-
SHA256
ffddef5f1b6d3e9d2fa6da987fbc78c53adb21b91528b0bd2490b7ef29f0bca7
-
SHA512
790bb21b90a530437c3f758dc82b255cfeaa9c0242f5c7d9d6609e9057ce7ff9f0145933fc979ae01cb956547a20147ba81d3905d26484918bebbe2c49dd70bb
-
SSDEEP
49152:APoTtBnmh+HpT7E7WkTcTJLTna1YiYNK4ziBBnmPJ:APatBmh+HpTYpTuLTMHYNKkeBmPJ
-
Checks Android system properties for emulator presence.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries the mobile country code (MCC)
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
-
-
Target
polyvideo.apk
-
Size
417KB
-
MD5
8ace627ef94c52afb06eaae0acf85feb
-
SHA1
c26f6164eda37a3151be59274639a56e3a3671df
-
SHA256
a990fecd5e36f453b1195a7868a645e1de6b1bfffb54df139d26d037c32a3eb1
-
SHA512
39276089f005f446ce5883296069cbe286176912eed66128007454da7bf64ba5db498726598d7ac18c1ad404df0411515f8691018cfc32b8068cde8409a065d7
-
SSDEEP
12288:1PnDnkGKX3gAQWa0LBca09eT+u9iXLP0hcnxc:1PnD7Q3DQ50Bc34T+D8hqxc
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about active data network
-
Queries the mobile country code (MCC)
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Hide Artifacts
1Suppress Application Icon
1Virtualization/Sandbox Evasion
3System Checks
3