General
-
Target
28a726245171e1cbc7db2ea77fc0f8bc_JaffaCakes118
-
Size
23.1MB
-
Sample
240509-gxxsesdh4s
-
MD5
28a726245171e1cbc7db2ea77fc0f8bc
-
SHA1
afcd734c83c8c3db1f82029fe8f6d81df8e74462
-
SHA256
a9adc004b50e46315f02f24c7075fed775b9473ada633cb09a03467aa03fdf0e
-
SHA512
8c76f60fcf6be1c9439705c35d68fa8cd4cc11e8ac74a498d3e35bc81792b2ae75a2abdb0765c000b43ae31b9ce3f4094c7d0f4a39b550de8fbc48fbd4c14c80
-
SSDEEP
393216:nuSvCajryUX+CsOJFYuUWg4TiqBKxUHCVsV6Dnj+sr+CAt9FwFi2dP55XFbp1gp6:nx/ocaOLB0dsVWnTr9AjFq95PUpPUz
Behavioral task
behavioral1
Sample
28a726245171e1cbc7db2ea77fc0f8bc_JaffaCakes118.apk
Resource
android-x86-arm-20240506-en
Behavioral task
behavioral2
Sample
28a726245171e1cbc7db2ea77fc0f8bc_JaffaCakes118.apk
Resource
android-x64-20240506-en
Malware Config
Targets
-
-
Target
28a726245171e1cbc7db2ea77fc0f8bc_JaffaCakes118
-
Size
23.1MB
-
MD5
28a726245171e1cbc7db2ea77fc0f8bc
-
SHA1
afcd734c83c8c3db1f82029fe8f6d81df8e74462
-
SHA256
a9adc004b50e46315f02f24c7075fed775b9473ada633cb09a03467aa03fdf0e
-
SHA512
8c76f60fcf6be1c9439705c35d68fa8cd4cc11e8ac74a498d3e35bc81792b2ae75a2abdb0765c000b43ae31b9ce3f4094c7d0f4a39b550de8fbc48fbd4c14c80
-
SSDEEP
393216:nuSvCajryUX+CsOJFYuUWg4TiqBKxUHCVsV6Dnj+sr+CAt9FwFi2dP55XFbp1gp6:nx/ocaOLB0dsVWnTr9AjFq95PUpPUz
-
Checks Android system properties for emulator presence.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-