General
-
Target
662dc37e22bc734704718609fd803370_JaffaCakes118
-
Size
1.8MB
-
Sample
240522-gadq2adf81
-
MD5
662dc37e22bc734704718609fd803370
-
SHA1
be35c7462b472ac8c60964311aef2fa80bf8d18a
-
SHA256
a5a62b3cfb4c62d15be22802e4873d62a52472a94b1d972b02f1022f451e7092
-
SHA512
215418d65c1add4f32c13faf70a42b8662848fc1c2b9b5cfb8410c50f286e0b80af12e146a5924e131d70689b0c9af2c05209fd80e7c0e9ae6db332ede099329
-
SSDEEP
49152:U9e5oh7nATCs83N6g5mmr1fwGoMBloMHXlu0QfF73ZUY:U9e5oh7nUCsmU/Mv5HXlu1D
Static task
static1
Behavioral task
behavioral1
Sample
662dc37e22bc734704718609fd803370_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
662dc37e22bc734704718609fd803370_JaffaCakes118.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral3
Sample
662dc37e22bc734704718609fd803370_JaffaCakes118.apk
Resource
android-x64-arm64-20240514-en
Malware Config
Targets
-
-
Target
662dc37e22bc734704718609fd803370_JaffaCakes118
-
Size
1.8MB
-
MD5
662dc37e22bc734704718609fd803370
-
SHA1
be35c7462b472ac8c60964311aef2fa80bf8d18a
-
SHA256
a5a62b3cfb4c62d15be22802e4873d62a52472a94b1d972b02f1022f451e7092
-
SHA512
215418d65c1add4f32c13faf70a42b8662848fc1c2b9b5cfb8410c50f286e0b80af12e146a5924e131d70689b0c9af2c05209fd80e7c0e9ae6db332ede099329
-
SSDEEP
49152:U9e5oh7nATCs83N6g5mmr1fwGoMBloMHXlu0QfF73ZUY:U9e5oh7nUCsmU/Mv5HXlu1D
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Schedules tasks to execute at a specified time
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
-