General
-
Target
5b53c4b07aa9e3acf156a6982b3b5403_JaffaCakes118
-
Size
1.9MB
-
Sample
240519-zbyfyage64
-
MD5
5b53c4b07aa9e3acf156a6982b3b5403
-
SHA1
2964e38a909694f0365e076590e77ccf7a4e91d4
-
SHA256
debe3bc91c1b33828702efe2e04553596dea346b6c1632e21c64d14640c31b91
-
SHA512
d4c7f01dbbdd957b3c8c03fbeea2194418c410199df31cb65723006633bf552a60f87d6a52a0c152a9fb64d03e3695dcb2fee54241b324e607602c920d43b213
-
SSDEEP
49152:XxN9b1SEknXI5yg18ZXjcopbQfHhsSEUgbXziooOs:z9b1RknXI5ygqZTcopiHh7EPXzio/s
Static task
static1
Behavioral task
behavioral1
Sample
5b53c4b07aa9e3acf156a6982b3b5403_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
5b53c4b07aa9e3acf156a6982b3b5403_JaffaCakes118.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral3
Sample
5b53c4b07aa9e3acf156a6982b3b5403_JaffaCakes118.apk
Resource
android-x64-arm64-20240514-en
Malware Config
Targets
-
-
Target
5b53c4b07aa9e3acf156a6982b3b5403_JaffaCakes118
-
Size
1.9MB
-
MD5
5b53c4b07aa9e3acf156a6982b3b5403
-
SHA1
2964e38a909694f0365e076590e77ccf7a4e91d4
-
SHA256
debe3bc91c1b33828702efe2e04553596dea346b6c1632e21c64d14640c31b91
-
SHA512
d4c7f01dbbdd957b3c8c03fbeea2194418c410199df31cb65723006633bf552a60f87d6a52a0c152a9fb64d03e3695dcb2fee54241b324e607602c920d43b213
-
SSDEEP
49152:XxN9b1SEknXI5yg18ZXjcopbQfHhsSEUgbXziooOs:z9b1RknXI5ygqZTcopiHh7EPXzio/s
-
Checks if the Android device is rooted.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-