General
-
Target
6c686f16cb857a86473afc26ada5948e_JaffaCakes118
-
Size
18.1MB
-
Sample
240523-1zzjksaf8w
-
MD5
6c686f16cb857a86473afc26ada5948e
-
SHA1
abc99ced94d7d680468b8e54383d6d6f5fc006ef
-
SHA256
00f3ce231cfef30c3779fa27838c8583d94d244e24c55fd81e658af4e4cc8d64
-
SHA512
3eab1748d679ca6456b362ef056a0b2f87a858acf8f02148fc857caf0b07f6552eea183cd67e2643284b55adb8a20146f402da1ded546d06e5db0ff64fcc7efb
-
SSDEEP
393216:ScZQO/D1s2RM83uON8GDB62G+BbEAlmLP840dZvt:3vnM83gGEJVaz
Static task
static1
Behavioral task
behavioral1
Sample
6c686f16cb857a86473afc26ada5948e_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
6c686f16cb857a86473afc26ada5948e_JaffaCakes118.apk
Resource
android-x64-arm64-20240514-en
Malware Config
Targets
-
-
Target
6c686f16cb857a86473afc26ada5948e_JaffaCakes118
-
Size
18.1MB
-
MD5
6c686f16cb857a86473afc26ada5948e
-
SHA1
abc99ced94d7d680468b8e54383d6d6f5fc006ef
-
SHA256
00f3ce231cfef30c3779fa27838c8583d94d244e24c55fd81e658af4e4cc8d64
-
SHA512
3eab1748d679ca6456b362ef056a0b2f87a858acf8f02148fc857caf0b07f6552eea183cd67e2643284b55adb8a20146f402da1ded546d06e5db0ff64fcc7efb
-
SSDEEP
393216:ScZQO/D1s2RM83uON8GDB62G+BbEAlmLP840dZvt:3vnM83gGEJVaz
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks the presence of a debugger
-