General
-
Target
679f92481a5fd52740f69c7639a4311f_JaffaCakes118
-
Size
600KB
-
Sample
240522-r5fh8aeh3w
-
MD5
679f92481a5fd52740f69c7639a4311f
-
SHA1
5e07cb8a16ea233ee617897ef710f799f3a4fcd5
-
SHA256
9e14bedc5f5a619ffd5ed95eb98312384ac0da2667bacbf3daeea5f359b67212
-
SHA512
8b01161d2761f7a39af2254e72d37a8ac48ae88398dfaec6d9013d556a4fba84968f86170ee9001661b15c220ec9534905f5eff91acf9db703976062f2a3b394
-
SSDEEP
12288:uEQxhv+5dElRinRQomdi3p/QTaRHa0fiadICelXXzua9i:uVRC2inRQfuQTIHa0fiAbelzuaU
Static task
static1
Behavioral task
behavioral1
Sample
679f92481a5fd52740f69c7639a4311f_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
679f92481a5fd52740f69c7639a4311f_JaffaCakes118.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral3
Sample
679f92481a5fd52740f69c7639a4311f_JaffaCakes118.apk
Resource
android-x64-arm64-20240514-en
Malware Config
Targets
-
-
Target
679f92481a5fd52740f69c7639a4311f_JaffaCakes118
-
Size
600KB
-
MD5
679f92481a5fd52740f69c7639a4311f
-
SHA1
5e07cb8a16ea233ee617897ef710f799f3a4fcd5
-
SHA256
9e14bedc5f5a619ffd5ed95eb98312384ac0da2667bacbf3daeea5f359b67212
-
SHA512
8b01161d2761f7a39af2254e72d37a8ac48ae88398dfaec6d9013d556a4fba84968f86170ee9001661b15c220ec9534905f5eff91acf9db703976062f2a3b394
-
SSDEEP
12288:uEQxhv+5dElRinRQomdi3p/QTaRHa0fiadICelXXzua9i:uVRC2inRQfuQTIHa0fiAbelzuaU
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries the mobile country code (MCC)
-
Reads the content of SMS inbox messages.
-
Reads the content of the SMS messages.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-