General
-
Target
6311dbe19b9ec870859f47a134941e57_JaffaCakes118
-
Size
1.8MB
-
Sample
240521-m6rknabc4t
-
MD5
6311dbe19b9ec870859f47a134941e57
-
SHA1
376ddd9b97ecfcd018ffdb11f93fb677ccf88429
-
SHA256
93a0f9c688ee9c17ca883f0eb186ea450bd0f6b39c13e97723d9ce17a9ae26d1
-
SHA512
d2555ef6a70edf2c59770abafb37a59c6b7b5061a14ff768d97fe70b1e60f046dd564ab97a375a7821b74784e7f11814fff755b9882dc9f97dde2cffea10f736
-
SSDEEP
49152:0sUkysx15lYOJLoM4v62mvteFp0QX73ZrH:06tzLoG2Uty1t
Static task
static1
Behavioral task
behavioral1
Sample
6311dbe19b9ec870859f47a134941e57_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
6311dbe19b9ec870859f47a134941e57_JaffaCakes118.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral3
Sample
6311dbe19b9ec870859f47a134941e57_JaffaCakes118.apk
Resource
android-x64-arm64-20240514-en
Malware Config
Targets
-
-
Target
6311dbe19b9ec870859f47a134941e57_JaffaCakes118
-
Size
1.8MB
-
MD5
6311dbe19b9ec870859f47a134941e57
-
SHA1
376ddd9b97ecfcd018ffdb11f93fb677ccf88429
-
SHA256
93a0f9c688ee9c17ca883f0eb186ea450bd0f6b39c13e97723d9ce17a9ae26d1
-
SHA512
d2555ef6a70edf2c59770abafb37a59c6b7b5061a14ff768d97fe70b1e60f046dd564ab97a375a7821b74784e7f11814fff755b9882dc9f97dde2cffea10f736
-
SSDEEP
49152:0sUkysx15lYOJLoM4v62mvteFp0QX73ZrH:06tzLoG2Uty1t
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Schedules tasks to execute at a specified time
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
-