General
-
Target
412fff494d7b236c9e368acbc259dae0_JaffaCakes118
-
Size
17.1MB
-
Sample
240514-mnxzqace78
-
MD5
412fff494d7b236c9e368acbc259dae0
-
SHA1
68c6e233c9632e701a33a5a6a21834c24aad4a9a
-
SHA256
dc8b32753852add343eecb7eb94c47ada02b98fd69fe7655b5df62b51ceb6767
-
SHA512
4a3e3e556fd45fe78046cb710991d95643709b2f883d0ffa5eab844980f727f6f80af6cf4df593fed94508302d5bba2eae4b25171aec8a5481e98e848a717108
-
SSDEEP
393216:EvA68vIvS4v1MNf3ZYvo9BiiQH/w9T+zsy7h5Rq2MzDjsLN3z84:HHvIvxv1qvevPiQ4Ysy95RmjA9zZ
Static task
static1
Behavioral task
behavioral1
Sample
412fff494d7b236c9e368acbc259dae0_JaffaCakes118.apk
Resource
android-x86-arm-20240506-en
Behavioral task
behavioral2
Sample
412fff494d7b236c9e368acbc259dae0_JaffaCakes118.apk
Resource
android-x64-20240506-en
Malware Config
Targets
-
-
Target
412fff494d7b236c9e368acbc259dae0_JaffaCakes118
-
Size
17.1MB
-
MD5
412fff494d7b236c9e368acbc259dae0
-
SHA1
68c6e233c9632e701a33a5a6a21834c24aad4a9a
-
SHA256
dc8b32753852add343eecb7eb94c47ada02b98fd69fe7655b5df62b51ceb6767
-
SHA512
4a3e3e556fd45fe78046cb710991d95643709b2f883d0ffa5eab844980f727f6f80af6cf4df593fed94508302d5bba2eae4b25171aec8a5481e98e848a717108
-
SSDEEP
393216:EvA68vIvS4v1MNf3ZYvo9BiiQH/w9T+zsy7h5Rq2MzDjsLN3z84:HHvIvxv1qvevPiQ4Ysy95RmjA9zZ
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Queries the unique device ID (IMEI, MEID, IMSI)
-