General
-
Target
52a3733bfc9b889f54e17c87db79ac39_JaffaCakes118
-
Size
1.9MB
-
Sample
240518-cvscpsfh5z
-
MD5
52a3733bfc9b889f54e17c87db79ac39
-
SHA1
20fbaf5f276ef03f36edbe9448aad5b0df23b2f2
-
SHA256
850bdbcd6d5f74d3b5958ae440e5b65134eadc949f1f9acc6ed790d3a9cd483a
-
SHA512
6b9333dc1a3f13a90d35df6a2ec7ca8c0d6551f8671d444b2655349c3989b68e9f7ac9f45048b0e4bbe52aed4c331d31a4fe82e369c06b0f0fce98a742a8b548
-
SSDEEP
49152:XxMMQjcEIzqWrrfi3rQrnXtKXFTkOKLiwM0Qiuk/wuk/Xuk/I73ZEv:Xu5Yzqoi7qkOOKGwM1iuDuCum
Static task
static1
Behavioral task
behavioral1
Sample
52a3733bfc9b889f54e17c87db79ac39_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
52a3733bfc9b889f54e17c87db79ac39_JaffaCakes118.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral3
Sample
52a3733bfc9b889f54e17c87db79ac39_JaffaCakes118.apk
Resource
android-x64-arm64-20240514-en
Malware Config
Targets
-
-
Target
52a3733bfc9b889f54e17c87db79ac39_JaffaCakes118
-
Size
1.9MB
-
MD5
52a3733bfc9b889f54e17c87db79ac39
-
SHA1
20fbaf5f276ef03f36edbe9448aad5b0df23b2f2
-
SHA256
850bdbcd6d5f74d3b5958ae440e5b65134eadc949f1f9acc6ed790d3a9cd483a
-
SHA512
6b9333dc1a3f13a90d35df6a2ec7ca8c0d6551f8671d444b2655349c3989b68e9f7ac9f45048b0e4bbe52aed4c331d31a4fe82e369c06b0f0fce98a742a8b548
-
SSDEEP
49152:XxMMQjcEIzqWrrfi3rQrnXtKXFTkOKLiwM0Qiuk/wuk/Xuk/I73ZEv:Xu5Yzqoi7qkOOKGwM1iuDuCum
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Schedules tasks to execute at a specified time
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
-