General
-
Target
c37ae32cd4bcce93797535082e2080a2_JaffaCakes118
-
Size
3.0MB
-
Sample
241204-vdt43sxjdr
-
MD5
c37ae32cd4bcce93797535082e2080a2
-
SHA1
ae84294f83e45c8a9180cb6a0e658181fdee62fc
-
SHA256
2b305310db25d5ac714d4e5df898fa336e0bb3b86039b42ea37762f00956b3ff
-
SHA512
6b1005ce7b3749d94126be73e926bfea988a3961a95a493bb879e3efaea93b62936a13589c063601fda32cc1403b0b9639661dfe7183bb395c6d23c431f6506e
-
SSDEEP
49152:4MZfhiOsnVv0VdpuowM1EqMz3KDH8ZEesJfZhANAZdo5R0fe5Cn5z5Fa/SPxAqw5:4Qf9aVv0Vd8JQMmDcZsfZhu6o5K44rFq
Static task
static1
Behavioral task
behavioral1
Sample
c37ae32cd4bcce93797535082e2080a2_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
c37ae32cd4bcce93797535082e2080a2_JaffaCakes118.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
c37ae32cd4bcce93797535082e2080a2_JaffaCakes118.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Targets
-
-
Target
c37ae32cd4bcce93797535082e2080a2_JaffaCakes118
-
Size
3.0MB
-
MD5
c37ae32cd4bcce93797535082e2080a2
-
SHA1
ae84294f83e45c8a9180cb6a0e658181fdee62fc
-
SHA256
2b305310db25d5ac714d4e5df898fa336e0bb3b86039b42ea37762f00956b3ff
-
SHA512
6b1005ce7b3749d94126be73e926bfea988a3961a95a493bb879e3efaea93b62936a13589c063601fda32cc1403b0b9639661dfe7183bb395c6d23c431f6506e
-
SSDEEP
49152:4MZfhiOsnVv0VdpuowM1EqMz3KDH8ZEesJfZhANAZdo5R0fe5Cn5z5Fa/SPxAqw5:4Qf9aVv0Vd8JQMmDcZsfZhu6o5K44rFq
-
Hydra family
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Queries information about active data network
-
Queries the mobile country code (MCC)
-
Reads information about phone network operator.
-