General
-
Target
2bd6622f5ac557ad7d32a0324c0f1822_JaffaCakes118
-
Size
28.1MB
-
Sample
240509-1ja62sfh61
-
MD5
2bd6622f5ac557ad7d32a0324c0f1822
-
SHA1
9c2020889623eba4ebeba8e9d7f1d482b738515b
-
SHA256
688e92692871ed190bc2130d6f1e47547caa9b725b6abfc1304b8e2dfd7ad813
-
SHA512
545c002b27ab8e5fe6a9016105ecc52d771c63fc5816d2e86fdb65114f3bb1b1fc30610a8d923ed139b957138e16951d3d359e8381816ee44d3b99c4df3ba109
-
SSDEEP
393216:rKpFq/umHCj/YH2zWvw2KInhLyAhPn+CsmdW0kPjO3jyHlSfL+kqQvYOVEFMtU3:rOMGmH6/YH2uw2KOmCSPjISSCkqD+Ej3
Behavioral task
behavioral1
Sample
2bd6622f5ac557ad7d32a0324c0f1822_JaffaCakes118.apk
Resource
android-x86-arm-20240506-en
Behavioral task
behavioral2
Sample
2bd6622f5ac557ad7d32a0324c0f1822_JaffaCakes118.apk
Resource
android-x64-20240506-en
Malware Config
Targets
-
-
Target
2bd6622f5ac557ad7d32a0324c0f1822_JaffaCakes118
-
Size
28.1MB
-
MD5
2bd6622f5ac557ad7d32a0324c0f1822
-
SHA1
9c2020889623eba4ebeba8e9d7f1d482b738515b
-
SHA256
688e92692871ed190bc2130d6f1e47547caa9b725b6abfc1304b8e2dfd7ad813
-
SHA512
545c002b27ab8e5fe6a9016105ecc52d771c63fc5816d2e86fdb65114f3bb1b1fc30610a8d923ed139b957138e16951d3d359e8381816ee44d3b99c4df3ba109
-
SSDEEP
393216:rKpFq/umHCj/YH2zWvw2KInhLyAhPn+CsmdW0kPjO3jyHlSfL+kqQvYOVEFMtU3:rOMGmH6/YH2uw2KOmCSPjISSCkqD+Ej3
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-