General
-
Target
533caf598d587d6a115c8ca5e0d3ed75_JaffaCakes118
-
Size
1.9MB
-
Sample
240518-ggnvksec9s
-
MD5
533caf598d587d6a115c8ca5e0d3ed75
-
SHA1
6634377b70983c613f8863de78db52d053a966f3
-
SHA256
86b298735bfcecd9a3c96dde327ea77f998873a98784e98befbebb4e2a90fb4c
-
SHA512
6655526bf4b585c6f4e1ee223683566c8d6bf73003ffa6e7e6ff9c2c1728e21d6e5641dbcbe12821b11b8a3e1492bb0c2414b86b33dace0f32434ab7e3e5c30e
-
SSDEEP
49152:ItSgvL4Z0Ru1ZR3C7VBuQnXxNGES0QwhS73ZL6:I9T4GRgjAVBuQB431kb
Static task
static1
Behavioral task
behavioral1
Sample
533caf598d587d6a115c8ca5e0d3ed75_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
533caf598d587d6a115c8ca5e0d3ed75_JaffaCakes118.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral3
Sample
533caf598d587d6a115c8ca5e0d3ed75_JaffaCakes118.apk
Resource
android-x64-arm64-20240514-en
Malware Config
Targets
-
-
Target
533caf598d587d6a115c8ca5e0d3ed75_JaffaCakes118
-
Size
1.9MB
-
MD5
533caf598d587d6a115c8ca5e0d3ed75
-
SHA1
6634377b70983c613f8863de78db52d053a966f3
-
SHA256
86b298735bfcecd9a3c96dde327ea77f998873a98784e98befbebb4e2a90fb4c
-
SHA512
6655526bf4b585c6f4e1ee223683566c8d6bf73003ffa6e7e6ff9c2c1728e21d6e5641dbcbe12821b11b8a3e1492bb0c2414b86b33dace0f32434ab7e3e5c30e
-
SSDEEP
49152:ItSgvL4Z0Ru1ZR3C7VBuQnXxNGES0QwhS73ZL6:I9T4GRgjAVBuQB431kb
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Schedules tasks to execute at a specified time
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
-