General
-
Target
38716f839b1bdda0a97d3ba22f90794a_JaffaCakes118
-
Size
1.2MB
-
Sample
240512-fxqhnsac8y
-
MD5
38716f839b1bdda0a97d3ba22f90794a
-
SHA1
a8239ecb3b6650554593e353a69b781c93f84785
-
SHA256
56597a06fb16925859fe01ff734409d950bbd494eb30d854745e9430d4da5295
-
SHA512
d105d768ca13011edcd34cd2b7cbcd19280496a284e5460944bd6362cf978eb49c20dc1d2b6b7d24f30bfcc823c51bca24c4d87c3f1a77048d67555170ef1042
-
SSDEEP
24576:b2yBmGMldP4YZMXNEvovYNcy2DUOE5dYhcYL3XAvCr5CP/:b8hZ8NESYNp2DNE5ccIA6re
Static task
static1
Behavioral task
behavioral1
Sample
38716f839b1bdda0a97d3ba22f90794a_JaffaCakes118.apk
Resource
android-x86-arm-20240506-en
Behavioral task
behavioral2
Sample
38716f839b1bdda0a97d3ba22f90794a_JaffaCakes118.apk
Resource
android-x64-20240506-en
Malware Config
Targets
-
-
Target
38716f839b1bdda0a97d3ba22f90794a_JaffaCakes118
-
Size
1.2MB
-
MD5
38716f839b1bdda0a97d3ba22f90794a
-
SHA1
a8239ecb3b6650554593e353a69b781c93f84785
-
SHA256
56597a06fb16925859fe01ff734409d950bbd494eb30d854745e9430d4da5295
-
SHA512
d105d768ca13011edcd34cd2b7cbcd19280496a284e5460944bd6362cf978eb49c20dc1d2b6b7d24f30bfcc823c51bca24c4d87c3f1a77048d67555170ef1042
-
SSDEEP
24576:b2yBmGMldP4YZMXNEvovYNcy2DUOE5dYhcYL3XAvCr5CP/:b8hZ8NESYNp2DNE5ccIA6re
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Queries the unique device ID (IMEI, MEID, IMSI)
-