General
-
Target
8adba31dc13952f0395827f3a35ad8f7_JaffaCakes118
-
Size
23.7MB
-
Sample
241103-lw4lsstpen
-
MD5
8adba31dc13952f0395827f3a35ad8f7
-
SHA1
717d958d4cae7147ae0af0c2fbfce8ff44a270cc
-
SHA256
6c628b073f893cd458ead4a1ce090645bbc098fbe2f5d9508ce20e81c5a85f2a
-
SHA512
990dbe73227b3624141adbfcac8825f94a8043e2cb56c62cdc880bc12e34148258c21c68808685454c9b6ffbc844da1024bf0725cb08462765797a0635a47696
-
SSDEEP
393216:i4BrVgNu6oGIbSgnmSj3+TDzvDF9Z/yLXYOvhg/lNWQQ+VxTyPspQ1kWLIgJaysn:RBrVH6olnmSj3+TPrQHgz60yPQK87t6Y
Static task
static1
Behavioral task
behavioral1
Sample
8adba31dc13952f0395827f3a35ad8f7_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Malware Config
Targets
-
-
Target
8adba31dc13952f0395827f3a35ad8f7_JaffaCakes118
-
Size
23.7MB
-
MD5
8adba31dc13952f0395827f3a35ad8f7
-
SHA1
717d958d4cae7147ae0af0c2fbfce8ff44a270cc
-
SHA256
6c628b073f893cd458ead4a1ce090645bbc098fbe2f5d9508ce20e81c5a85f2a
-
SHA512
990dbe73227b3624141adbfcac8825f94a8043e2cb56c62cdc880bc12e34148258c21c68808685454c9b6ffbc844da1024bf0725cb08462765797a0635a47696
-
SSDEEP
393216:i4BrVgNu6oGIbSgnmSj3+TDzvDF9Z/yLXYOvhg/lNWQQ+VxTyPspQ1kWLIgJaysn:RBrVH6olnmSj3+TPrQHgz60yPQK87t6Y
Score7/10-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current nearby Wi-Fi networks
Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Reads information about phone network operator.
-
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Virtualization/Sandbox Evasion
2System Checks
2