General
-
Target
673c16c3bffbb516ab32203e923db00c_JaffaCakes118
-
Size
1.6MB
-
Sample
240522-pfzjpaaa29
-
MD5
673c16c3bffbb516ab32203e923db00c
-
SHA1
b9d584fee3514fffb8f13b2dc68bb75622dd17df
-
SHA256
92df33b4cd6ab2ca154607cc384060e0090e65e83a936505724c380874957efc
-
SHA512
9188b7a866b127c58257d8563ceb2bfcc9091fbafab90dc5fdd06e00e001636a375eca1d0d6f832ee2e9bacd18904c6a6ebe182dd311b27b4960ccbc2026aa16
-
SSDEEP
49152:rp+i39F4xAAzuT0fv/Bl1vEhPH/ptaQkMAJkKChl:rp4xAPy5A9HuJpZg
Static task
static1
Behavioral task
behavioral1
Sample
673c16c3bffbb516ab32203e923db00c_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
673c16c3bffbb516ab32203e923db00c_JaffaCakes118.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral3
Sample
673c16c3bffbb516ab32203e923db00c_JaffaCakes118.apk
Resource
android-x64-arm64-20240514-en
Malware Config
Targets
-
-
Target
673c16c3bffbb516ab32203e923db00c_JaffaCakes118
-
Size
1.6MB
-
MD5
673c16c3bffbb516ab32203e923db00c
-
SHA1
b9d584fee3514fffb8f13b2dc68bb75622dd17df
-
SHA256
92df33b4cd6ab2ca154607cc384060e0090e65e83a936505724c380874957efc
-
SHA512
9188b7a866b127c58257d8563ceb2bfcc9091fbafab90dc5fdd06e00e001636a375eca1d0d6f832ee2e9bacd18904c6a6ebe182dd311b27b4960ccbc2026aa16
-
SSDEEP
49152:rp+i39F4xAAzuT0fv/Bl1vEhPH/ptaQkMAJkKChl:rp4xAPy5A9HuJpZg
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Acquires the wake lock
-
Checks if the internet connection is available
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-