General
-
Target
8cb4a77ed16ff532a649904cf1668378_JaffaCakes118
-
Size
5.2MB
-
Sample
241103-v9cvnsyqfs
-
MD5
8cb4a77ed16ff532a649904cf1668378
-
SHA1
9d339b94a2c5143e701758337919907503f3ffed
-
SHA256
38352c3d95b5fddada696d1212ef31735ad5e4ec869bf34ffb044eaa320a2300
-
SHA512
082c965d95daac7481ce079f0f00baa85d6a0ede61d39f2a96a2cecad1935ca124e9363a267e3dc15d7210b4789fff07d83f2fb5e1e2b841c26308151bba35fd
-
SSDEEP
98304:TZiAbpI144v9esRVgesKHb/7iCwi3JfbeHTrN6cDGX0Dxk0jqx:Niam144VR+K7zltJezrC0Q
Static task
static1
Behavioral task
behavioral1
Sample
8cb4a77ed16ff532a649904cf1668378_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
com.pp.service.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral3
Sample
com.pp.service.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral4
Sample
com.pp.service.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Targets
-
-
Target
8cb4a77ed16ff532a649904cf1668378_JaffaCakes118
-
Size
5.2MB
-
MD5
8cb4a77ed16ff532a649904cf1668378
-
SHA1
9d339b94a2c5143e701758337919907503f3ffed
-
SHA256
38352c3d95b5fddada696d1212ef31735ad5e4ec869bf34ffb044eaa320a2300
-
SHA512
082c965d95daac7481ce079f0f00baa85d6a0ede61d39f2a96a2cecad1935ca124e9363a267e3dc15d7210b4789fff07d83f2fb5e1e2b841c26308151bba35fd
-
SSDEEP
98304:TZiAbpI144v9esRVgesKHb/7iCwi3JfbeHTrN6cDGX0Dxk0jqx:Niam144VR+K7zltJezrC0Q
-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current nearby Wi-Fi networks
Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Reads information about phone network operator.
-
Listens for changes in the sensor environment (might be used to detect emulation)
-
-
-
Target
com.pp.service.apk
-
Size
335KB
-
MD5
8fc0e41e28f8295e4dd246cd14b0bb9e
-
SHA1
3d48a6b428d39e54f04954e294df52b6f2e3f955
-
SHA256
45ae34277a4d844861ea92ec5bdbf8103e4b5d82c7acd5c174cbb27cf97d53b9
-
SHA512
58638d93ae4cd35ea485812cb32c3a9d2d508a95570f120311bcefde08f7384938125e9fe04c8340e7aa23bbec078008206ea8f9a150ff93f44d01d8301ed950
-
SSDEEP
6144:E13PYMm9GBBVX9oI7N7Fuzvl9itmJmht/9z4M1N9t3Oj955T8z:LcBBAIZZuzvY7hvzv1N9tej955wz
Score1/10 -
MITRE ATT&CK Mobile v15
Defense Evasion
Execution Guardrails
1Geofencing
1Hide Artifacts
1User Evasion
1Virtualization/Sandbox Evasion
1System Checks
1