General
-
Target
52c13afafdfca275d95cbd6a9460c1ce_JaffaCakes118
-
Size
1.9MB
-
Sample
240518-dhqtsahb74
-
MD5
52c13afafdfca275d95cbd6a9460c1ce
-
SHA1
3cef343b2135c1a9ad787d31c15cdc66cc172fe5
-
SHA256
40ff44828278ea9cb477df8d609b489218161eaf24065ed8df7c89467902e2fe
-
SHA512
7c866a229d7aa30125961089acbd3df1c29ec1a7b8d56d42843eb9f93ce8dbf598d39dc2bbe0c1630e21c0fe5bc1241621234cd49149c9b6ba308a445d6782e7
-
SSDEEP
24576:kqYT6mZDJqoivWPt2QJm5WE5E0QLfA97Ux2sxfF4YuDhG1LLUOofV73Zu6j:kLDJYW4WEfQLfA97UsKqKQF73Z5j
Static task
static1
Behavioral task
behavioral1
Sample
52c13afafdfca275d95cbd6a9460c1ce_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
52c13afafdfca275d95cbd6a9460c1ce_JaffaCakes118.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral3
Sample
52c13afafdfca275d95cbd6a9460c1ce_JaffaCakes118.apk
Resource
android-x64-arm64-20240514-en
Malware Config
Targets
-
-
Target
52c13afafdfca275d95cbd6a9460c1ce_JaffaCakes118
-
Size
1.9MB
-
MD5
52c13afafdfca275d95cbd6a9460c1ce
-
SHA1
3cef343b2135c1a9ad787d31c15cdc66cc172fe5
-
SHA256
40ff44828278ea9cb477df8d609b489218161eaf24065ed8df7c89467902e2fe
-
SHA512
7c866a229d7aa30125961089acbd3df1c29ec1a7b8d56d42843eb9f93ce8dbf598d39dc2bbe0c1630e21c0fe5bc1241621234cd49149c9b6ba308a445d6782e7
-
SSDEEP
24576:kqYT6mZDJqoivWPt2QJm5WE5E0QLfA97Ux2sxfF4YuDhG1LLUOofV73Zu6j:kLDJYW4WEfQLfA97UsKqKQF73Z5j
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Schedules tasks to execute at a specified time
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
-