General
-
Target
3d4c33deab60f038202a966c381548e2_JaffaCakes118
-
Size
9.4MB
-
Sample
240514-bcpnescf5s
-
MD5
3d4c33deab60f038202a966c381548e2
-
SHA1
304b73342f88d2196d2620de2374fbcfd202662b
-
SHA256
c3b67a1184a915765f627d1a31b7ce36e2eff0ce327ad17dc2af992ad78c130d
-
SHA512
5b3dd85ead233ca8d05af256df476e3ae3662d41dafa742e626515d5dd648a793e7359eec9657b0d7bf993374bf3bb52662dbb6cfa77532978d39bec197c0db9
-
SSDEEP
196608:+pGnUNWWorqtyU7zUBexmrwj4CC5PIloQZoi7P1e4ZfK9:+px/kUPXxv4j5PyEuXZW
Static task
static1
Behavioral task
behavioral1
Sample
3d4c33deab60f038202a966c381548e2_JaffaCakes118.apk
Resource
android-x86-arm-20240506-en
Behavioral task
behavioral2
Sample
3d4c33deab60f038202a966c381548e2_JaffaCakes118.apk
Resource
android-x64-arm64-20240506-en
Malware Config
Targets
-
-
Target
3d4c33deab60f038202a966c381548e2_JaffaCakes118
-
Size
9.4MB
-
MD5
3d4c33deab60f038202a966c381548e2
-
SHA1
304b73342f88d2196d2620de2374fbcfd202662b
-
SHA256
c3b67a1184a915765f627d1a31b7ce36e2eff0ce327ad17dc2af992ad78c130d
-
SHA512
5b3dd85ead233ca8d05af256df476e3ae3662d41dafa742e626515d5dd648a793e7359eec9657b0d7bf993374bf3bb52662dbb6cfa77532978d39bec197c0db9
-
SSDEEP
196608:+pGnUNWWorqtyU7zUBexmrwj4CC5PIloQZoi7P1e4ZfK9:+px/kUPXxv4j5PyEuXZW
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-