General
-
Target
6ff9abd28c951bdf6dcbff04a2d1b934_JaffaCakes118
-
Size
15.6MB
-
Sample
241023-vnsn1ataqp
-
MD5
6ff9abd28c951bdf6dcbff04a2d1b934
-
SHA1
8653ef7858c9ffa6e7fa874db4af497b373160f3
-
SHA256
d19ab17982d245dd0bd6a0caeb79c73746a24dffe436ab65fecab506bb0c2e4f
-
SHA512
57e3c35b9d943da9e9d75c1a6a8326722666b68116e2a24e83e6dcd7955e12002cf8b9bbdda5f5638e8b3bda7affb64ea921c9b5c4af795a4268512d4470bf60
-
SSDEEP
393216:FqaEl2Y3D/ipWA4y3ySwrQUnpMgnOKJrCbO9VFAYEN:UflP3D/XH7XbpZnOKJVvc
Static task
static1
Behavioral task
behavioral1
Sample
6ff9abd28c951bdf6dcbff04a2d1b934_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Malware Config
Targets
-
-
Target
6ff9abd28c951bdf6dcbff04a2d1b934_JaffaCakes118
-
Size
15.6MB
-
MD5
6ff9abd28c951bdf6dcbff04a2d1b934
-
SHA1
8653ef7858c9ffa6e7fa874db4af497b373160f3
-
SHA256
d19ab17982d245dd0bd6a0caeb79c73746a24dffe436ab65fecab506bb0c2e4f
-
SHA512
57e3c35b9d943da9e9d75c1a6a8326722666b68116e2a24e83e6dcd7955e12002cf8b9bbdda5f5638e8b3bda7affb64ea921c9b5c4af795a4268512d4470bf60
-
SSDEEP
393216:FqaEl2Y3D/ipWA4y3ySwrQUnpMgnOKJrCbO9VFAYEN:UflP3D/XH7XbpZnOKJVvc
Score8/10-
Checks if the Android device is rooted.
-
Checks Android system properties for emulator presence.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about active data network
-
Queries the mobile country code (MCC)
-
Listens for changes in the sensor environment (might be used to detect emulation)
-
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Hide Artifacts
1User Evasion
1Virtualization/Sandbox Evasion
3System Checks
3