General
-
Target
031c23fd3b82fa5d868106a1e491993f_JaffaCakes118
-
Size
468KB
-
Sample
240427-m6yzqshg8t
-
MD5
031c23fd3b82fa5d868106a1e491993f
-
SHA1
4253ee20e80a0c2a5ca2363954ac85312219033b
-
SHA256
fec05b6b5b1766704dc00c254f80dd6237e3916d182ea9ce706bf3072e2fae4c
-
SHA512
028a594ea809f732444895afb2ae845d0a6b1dbd58fd47f9fcebb5dd9c6dc86e31bf36d270c22305d75e5036b7793ab5263e2f8ab1d36a95d1bbd498d369c3f2
-
SSDEEP
12288:iIxAQmLz+T9wiAEVZ6xbS+7bR5ne5PW9CeR:iIxAh6T9wiAEv6xGgRIfG
Static task
static1
Behavioral task
behavioral1
Sample
031c23fd3b82fa5d868106a1e491993f_JaffaCakes118.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
031c23fd3b82fa5d868106a1e491993f_JaffaCakes118.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral3
Sample
031c23fd3b82fa5d868106a1e491993f_JaffaCakes118.apk
Resource
android-x64-arm64-20240221-en
Malware Config
Targets
-
-
Target
031c23fd3b82fa5d868106a1e491993f_JaffaCakes118
-
Size
468KB
-
MD5
031c23fd3b82fa5d868106a1e491993f
-
SHA1
4253ee20e80a0c2a5ca2363954ac85312219033b
-
SHA256
fec05b6b5b1766704dc00c254f80dd6237e3916d182ea9ce706bf3072e2fae4c
-
SHA512
028a594ea809f732444895afb2ae845d0a6b1dbd58fd47f9fcebb5dd9c6dc86e31bf36d270c22305d75e5036b7793ab5263e2f8ab1d36a95d1bbd498d369c3f2
-
SSDEEP
12288:iIxAQmLz+T9wiAEVZ6xbS+7bR5ne5PW9CeR:iIxAh6T9wiAEv6xGgRIfG
-
Checks Android system properties for emulator presence.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Queries the unique device ID (IMEI, MEID, IMSI)
-