General
-
Target
62b458f79c2671ad9077216e42651dd0_JaffaCakes118
-
Size
24.4MB
-
Sample
240521-krs4tsfd2y
-
MD5
62b458f79c2671ad9077216e42651dd0
-
SHA1
4578321cd54995932f1943af4aadf0b333ac2f3b
-
SHA256
df57adedfe033c17504cbc967bc9eff3bcf5e2670186656a862f2a43a40a0913
-
SHA512
f55bda659fc909e977691e508a2fc549b78eca52d9cb34e8b61cbd8ebc731696180ccb7cf240e17730fac0b5bf1db9597f5c40abd72fb7b97f3ae21080753acf
-
SSDEEP
393216:BFt9GODN02kcSFJS34lc/L8hRL+6A1HRGc0x/Lt1eChA+zUvB/LHTiW7Ya8ZdLIA:BFt0Bct34lcc9+667YZjEpZYao5lN
Static task
static1
Behavioral task
behavioral1
Sample
62b458f79c2671ad9077216e42651dd0_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
62b458f79c2671ad9077216e42651dd0_JaffaCakes118.apk
Resource
android-x64-20240514-en
Malware Config
Targets
-
-
Target
62b458f79c2671ad9077216e42651dd0_JaffaCakes118
-
Size
24.4MB
-
MD5
62b458f79c2671ad9077216e42651dd0
-
SHA1
4578321cd54995932f1943af4aadf0b333ac2f3b
-
SHA256
df57adedfe033c17504cbc967bc9eff3bcf5e2670186656a862f2a43a40a0913
-
SHA512
f55bda659fc909e977691e508a2fc549b78eca52d9cb34e8b61cbd8ebc731696180ccb7cf240e17730fac0b5bf1db9597f5c40abd72fb7b97f3ae21080753acf
-
SSDEEP
393216:BFt9GODN02kcSFJS34lc/L8hRL+6A1HRGc0x/Lt1eChA+zUvB/LHTiW7Ya8ZdLIA:BFt0Bct34lcc9+667YZjEpZYao5lN
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Queries the unique device ID (IMEI, MEID, IMSI)
-