General
-
Target
9edc71364c80c03d102a22dc68072a37_JaffaCakes118
-
Size
3.4MB
-
Sample
241126-a3cacavmes
-
MD5
9edc71364c80c03d102a22dc68072a37
-
SHA1
6b5f0150e9e9c737a3f6ce94fcdf630a633ab666
-
SHA256
192b40c3d71e04a7698bbe4ef6a274d9cf41de2aceccf2f5ce41ae7404d87b73
-
SHA512
df6aafdb6d5074c0983c03eb0f72bfa843bdf058d4c28599f5e07bc42fc61cacd245d4d3a82654146a7a9076ddf8609effb1f0329f6ebf32144ab6e34aaddb0c
-
SSDEEP
98304:8hWopSUW5PXsk2arQQRCBMwEda0bKI9EC:Z5P8k2arQLBMwEw1oEC
Static task
static1
Behavioral task
behavioral1
Sample
9edc71364c80c03d102a22dc68072a37_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
9edc71364c80c03d102a22dc68072a37_JaffaCakes118.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
9edc71364c80c03d102a22dc68072a37_JaffaCakes118.apk
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral4
Sample
SLSDK.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral5
Sample
SLSDK.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral6
Sample
SLSDK.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Targets
-
-
Target
9edc71364c80c03d102a22dc68072a37_JaffaCakes118
-
Size
3.4MB
-
MD5
9edc71364c80c03d102a22dc68072a37
-
SHA1
6b5f0150e9e9c737a3f6ce94fcdf630a633ab666
-
SHA256
192b40c3d71e04a7698bbe4ef6a274d9cf41de2aceccf2f5ce41ae7404d87b73
-
SHA512
df6aafdb6d5074c0983c03eb0f72bfa843bdf058d4c28599f5e07bc42fc61cacd245d4d3a82654146a7a9076ddf8609effb1f0329f6ebf32144ab6e34aaddb0c
-
SSDEEP
98304:8hWopSUW5PXsk2arQQRCBMwEda0bKI9EC:Z5P8k2arQLBMwEw1oEC
-
Checks if the Android device is rooted.
-
Checks Android system properties for emulator presence.
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about active data network
-
Queries the mobile country code (MCC)
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-
Requests enabling of the accessibility settings.
-
Tries to add a device administrator.
-
-
-
Target
SLSDK.apk
-
Size
551KB
-
MD5
19df8a31fb37c64cc9c3a7626c1c2a4a
-
SHA1
caedab35ebb979278623a49121165f2cb1962e49
-
SHA256
24e625ee70aee9c6c2ee08a0f83ed8f529beaed7ae8d1364f55ee7e3f1bd2137
-
SHA512
a3214c9d5aa5565410d39571bfe3c66ea0abf551ba66260ab1590110d4de4dd100cadca23260412c54d04c42999913178fd412c5dc24992c960768e20e0e88fa
-
SSDEEP
12288:kfNpcEAI9q6LHkBqgouSWYwOW4EaHZEAJJnNHPFPLfNtfaMQB+2aT:sjzAqqWsmNHFLfbfarotT
Score1/10 -
MITRE ATT&CK Mobile v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Device Administrator Permissions
1Defense Evasion
Download New Code at Runtime
1Input Injection
1Virtualization/Sandbox Evasion
3System Checks
3Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Process Discovery
1Software Discovery
1Security Software Discovery
1System Information Discovery
3System Network Configuration Discovery
3System Network Connections Discovery
1