General
-
Target
8c27fc87383efad3bfbf01841a2cbae1_JaffaCakes118
-
Size
1.3MB
-
Sample
241103-ssramawph1
-
MD5
8c27fc87383efad3bfbf01841a2cbae1
-
SHA1
5925ff84d8d64a3c73cab5f4da2f64a472289414
-
SHA256
47bac5a806d9e839ed5fdd8e0ee59570046ed3c41ff88a8415c20b97f8d2f3bc
-
SHA512
5a9e4380dbd1a370ae161847d70fae21699faff4d5359c558baf1808422f735654511946f073e03bde64846798a4b44a914f842333519891cf160c8ea8a6273f
-
SSDEEP
24576:knq9YeyOpJP0YJprCAbe+ptvGgdBzIkjtHzH4b13tvPm99aGGZHWqbKvmCDWUV:vYeyOPPLr/bZuszRj1zH4hVPm99a75m9
Static task
static1
Behavioral task
behavioral1
Sample
8c27fc87383efad3bfbf01841a2cbae1_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
8c27fc87383efad3bfbf01841a2cbae1_JaffaCakes118.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
8c27fc87383efad3bfbf01841a2cbae1_JaffaCakes118.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Targets
-
-
Target
8c27fc87383efad3bfbf01841a2cbae1_JaffaCakes118
-
Size
1.3MB
-
MD5
8c27fc87383efad3bfbf01841a2cbae1
-
SHA1
5925ff84d8d64a3c73cab5f4da2f64a472289414
-
SHA256
47bac5a806d9e839ed5fdd8e0ee59570046ed3c41ff88a8415c20b97f8d2f3bc
-
SHA512
5a9e4380dbd1a370ae161847d70fae21699faff4d5359c558baf1808422f735654511946f073e03bde64846798a4b44a914f842333519891cf160c8ea8a6273f
-
SSDEEP
24576:knq9YeyOpJP0YJprCAbe+ptvGgdBzIkjtHzH4b13tvPm99aGGZHWqbKvmCDWUV:vYeyOPPLr/bZuszRj1zH4hVPm99a75m9
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Acquires the wake lock
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the mobile country code (MCC)
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-
Requests dangerous framework permissions
-
MITRE ATT&CK Mobile v15
Defense Evasion
Execution Guardrails
1Geofencing
1Virtualization/Sandbox Evasion
2System Checks
2