General
-
Target
67f53b5ce8611b198696c0ff90b7af2f_JaffaCakes118
-
Size
28.2MB
-
Sample
240522-vhy9lahg74
-
MD5
67f53b5ce8611b198696c0ff90b7af2f
-
SHA1
ef9c00f58468c8368a9d9cd8a7eecaf9cb74ba89
-
SHA256
9f740f088b365f3a831c602e4c2435293edff0d801405545bd22f73508754ef6
-
SHA512
7e22ee0fc6ba68be2941037ae0fc78a0076f5ebeabbfa04ee0751e6d1a51d682b1e5fa9270fa21c632a0a005cb1b5a30a443a218bd37484842d0ed15d85e11d0
-
SSDEEP
786432:DgBxMCmOnTmRR9V9Mpiyh3iTl4WQr77VUYTAm:DgvMaTORD9tw3iuHuYT1
Static task
static1
Behavioral task
behavioral1
Sample
67f53b5ce8611b198696c0ff90b7af2f_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
67f53b5ce8611b198696c0ff90b7af2f_JaffaCakes118.apk
Resource
android-x64-20240514-en
Malware Config
Targets
-
-
Target
67f53b5ce8611b198696c0ff90b7af2f_JaffaCakes118
-
Size
28.2MB
-
MD5
67f53b5ce8611b198696c0ff90b7af2f
-
SHA1
ef9c00f58468c8368a9d9cd8a7eecaf9cb74ba89
-
SHA256
9f740f088b365f3a831c602e4c2435293edff0d801405545bd22f73508754ef6
-
SHA512
7e22ee0fc6ba68be2941037ae0fc78a0076f5ebeabbfa04ee0751e6d1a51d682b1e5fa9270fa21c632a0a005cb1b5a30a443a218bd37484842d0ed15d85e11d0
-
SSDEEP
786432:DgBxMCmOnTmRR9V9Mpiyh3iTl4WQr77VUYTAm:DgvMaTORD9tw3iuHuYT1
-
Checks if the Android device is rooted.
-
Checks Qemu related system properties.
Checks for Android system properties related to Qemu for Emulator detection.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-