General
-
Target
dcc61ee1bdbff7e2b659bfeb6bc4b929_JaffaCakes118
-
Size
16.9MB
-
Sample
241210-dvvnhasjg1
-
MD5
dcc61ee1bdbff7e2b659bfeb6bc4b929
-
SHA1
0d213c8d396702cdf36f8f9295542d82470be639
-
SHA256
a601ecd0a85763ad8687faae5d019d06656ebc99a06cb9d9568727c6b9d958a7
-
SHA512
c4a1bb0b71f43868eaad6d8d3f79c4ddb93e87bd4a570fee9030e9a2423b964cd2956a92a0bd52ae189959e793844816e4526a57af9193c9fb78e078dec5a7c7
-
SSDEEP
393216:uPErRu8smLMNk8fbMlZixtPCffNHGQtqiVYVD/MofEWoTnsdTXK:YEo5PNdf0UQfNHDgiVQjLEfTsdT6
Behavioral task
behavioral1
Sample
dcc61ee1bdbff7e2b659bfeb6bc4b929_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Malware Config
Targets
-
-
Target
dcc61ee1bdbff7e2b659bfeb6bc4b929_JaffaCakes118
-
Size
16.9MB
-
MD5
dcc61ee1bdbff7e2b659bfeb6bc4b929
-
SHA1
0d213c8d396702cdf36f8f9295542d82470be639
-
SHA256
a601ecd0a85763ad8687faae5d019d06656ebc99a06cb9d9568727c6b9d958a7
-
SHA512
c4a1bb0b71f43868eaad6d8d3f79c4ddb93e87bd4a570fee9030e9a2423b964cd2956a92a0bd52ae189959e793844816e4526a57af9193c9fb78e078dec5a7c7
-
SSDEEP
393216:uPErRu8smLMNk8fbMlZixtPCffNHGQtqiVYVD/MofEWoTnsdTXK:YEo5PNdf0UQfNHDgiVQjLEfTsdT6
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Reads information about phone network operator.
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Foreground Persistence
1Virtualization/Sandbox Evasion
1System Checks
1