General
-
Target
8601af853a0c90ecbb17341a167db091_JaffaCakes118
-
Size
10.4MB
-
Sample
241102-r61wjsznel
-
MD5
8601af853a0c90ecbb17341a167db091
-
SHA1
d415a13bc0d22f85cbc9bc83a3c497d97521686d
-
SHA256
8b333f29f9da4ec21d41993acb5baf643cf64630458790be9236c92c8a84218e
-
SHA512
ae0cd8fba470d9f2aa2dfc45a5be194b12375741ad2179b5c66add4285657e083979fef4596b06ee6d0ed1900bc92b8cbc3961725b3fb7451f491ba27a5f687b
-
SSDEEP
196608:zOdmFKcAwKhJ5ASVtK0HGWFpdqBwedO/C4l7FRmkM/maN+6L/706dR9t0pCkpy8S:zOXtASBzqMC4m/LT0sRsS
Static task
static1
Behavioral task
behavioral1
Sample
8601af853a0c90ecbb17341a167db091_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
8601af853a0c90ecbb17341a167db091_JaffaCakes118.apk
Resource
android-x64-20240624-en
Malware Config
Targets
-
-
Target
8601af853a0c90ecbb17341a167db091_JaffaCakes118
-
Size
10.4MB
-
MD5
8601af853a0c90ecbb17341a167db091
-
SHA1
d415a13bc0d22f85cbc9bc83a3c497d97521686d
-
SHA256
8b333f29f9da4ec21d41993acb5baf643cf64630458790be9236c92c8a84218e
-
SHA512
ae0cd8fba470d9f2aa2dfc45a5be194b12375741ad2179b5c66add4285657e083979fef4596b06ee6d0ed1900bc92b8cbc3961725b3fb7451f491ba27a5f687b
-
SSDEEP
196608:zOdmFKcAwKhJ5ASVtK0HGWFpdqBwedO/C4l7FRmkM/maN+6L/706dR9t0pCkpy8S:zOXtASBzqMC4m/LT0sRsS
-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Scheduled Task/Job
1Defense Evasion
Execution Guardrails
1Geofencing
1Virtualization/Sandbox Evasion
2System Checks
2