General
-
Target
4827ec44230ebff42696c483c436ef27_JaffaCakes118
-
Size
30.8MB
-
Sample
240515-1hfp5sdc6s
-
MD5
4827ec44230ebff42696c483c436ef27
-
SHA1
918b792b2aab56fb22283edecba2f8deae422777
-
SHA256
f91b1dba1c0eabe51715da817bea77ec14c8c9bd68daa5f7fe2d35c8bea2156b
-
SHA512
d8d04e236bffc22b4a404437dde489d282fea8b58629f202911e04301bddc70a9d53c1f894405d5e90a7a72c06acbbcf7721226e202d1fe4468a3826057c4c3d
-
SSDEEP
786432:nvSStD3HlD+a6mh4Z6tAptS5JhPjkaowf1DPyFlanySut6nA7:JD39H86tAptQJhQGIoyt57
Static task
static1
Behavioral task
behavioral1
Sample
4827ec44230ebff42696c483c436ef27_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
4827ec44230ebff42696c483c436ef27_JaffaCakes118.apk
Resource
android-x64-20240514-en
Malware Config
Targets
-
-
Target
4827ec44230ebff42696c483c436ef27_JaffaCakes118
-
Size
30.8MB
-
MD5
4827ec44230ebff42696c483c436ef27
-
SHA1
918b792b2aab56fb22283edecba2f8deae422777
-
SHA256
f91b1dba1c0eabe51715da817bea77ec14c8c9bd68daa5f7fe2d35c8bea2156b
-
SHA512
d8d04e236bffc22b4a404437dde489d282fea8b58629f202911e04301bddc70a9d53c1f894405d5e90a7a72c06acbbcf7721226e202d1fe4468a3826057c4c3d
-
SSDEEP
786432:nvSStD3HlD+a6mh4Z6tAptS5JhPjkaowf1DPyFlanySut6nA7:JD39H86tAptQJhQGIoyt57
-
Checks if the Android device is rooted.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Acquires the wake lock
-
Checks if the internet connection is available
-
Reads information about phone network operator.
-
Checks the presence of a debugger
-