General
-
Target
629f2e2a1f6ed88acaa889b9d9238a5a_JaffaCakes118
-
Size
10.5MB
-
Sample
240521-j5azqseb9y
-
MD5
629f2e2a1f6ed88acaa889b9d9238a5a
-
SHA1
eec30a718e75a42ce5bb9a4db4ac87d852b9bed7
-
SHA256
0e8103cd547c87dae7cb49afdd83e9028396a97cebe2c10aac7f10237f8478ca
-
SHA512
e190dcf70b30214dbc92c24a992dcd2a7b03b58f5e138d591291890ebe318a9cdaec0b8f0efe8378c7ee904296a31ed020ac1b0c22eef95cfeae15adbba6c33b
-
SSDEEP
196608:cVAXR8fyXofnEbDZ19jDIwaxioc5PIJcKfDN1wDf0JR8LkHqOpMa1WrGl:cmh8aQnEftjDIwaRE0rLN1SfoTMa1pl
Static task
static1
Behavioral task
behavioral1
Sample
629f2e2a1f6ed88acaa889b9d9238a5a_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
629f2e2a1f6ed88acaa889b9d9238a5a_JaffaCakes118.apk
Resource
android-x64-arm64-20240514-en
Malware Config
Targets
-
-
Target
629f2e2a1f6ed88acaa889b9d9238a5a_JaffaCakes118
-
Size
10.5MB
-
MD5
629f2e2a1f6ed88acaa889b9d9238a5a
-
SHA1
eec30a718e75a42ce5bb9a4db4ac87d852b9bed7
-
SHA256
0e8103cd547c87dae7cb49afdd83e9028396a97cebe2c10aac7f10237f8478ca
-
SHA512
e190dcf70b30214dbc92c24a992dcd2a7b03b58f5e138d591291890ebe318a9cdaec0b8f0efe8378c7ee904296a31ed020ac1b0c22eef95cfeae15adbba6c33b
-
SSDEEP
196608:cVAXR8fyXofnEbDZ19jDIwaxioc5PIJcKfDN1wDf0JR8LkHqOpMa1WrGl:cmh8aQnEftjDIwaRE0rLN1SfoTMa1pl
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-