General
-
Target
697a6472ed5f06d54b42064e5e6850f9_JaffaCakes118
-
Size
2.3MB
-
Sample
240523-c6kr1abb78
-
MD5
697a6472ed5f06d54b42064e5e6850f9
-
SHA1
20a9f3b505707157cf6c4408c6c66de0c2b47e09
-
SHA256
db0a1bc3fd2329470b9ba4df85badecd3cba7b5ac997f3c04e7f4a1dc1faaf73
-
SHA512
7c7a3a32f4af5a23bc94479e9ab76caaca2bfd899cd973f4cfef90a61855c23c96f50594b88e1002e787eb0c94f0411abd6ffdab00bf72cf8dfd921540d11355
-
SSDEEP
49152:tzZSmIi856LJMe39AsDzX90b6AIoBN5/NNyf:vvIiDyP2z9dLoBN5yf
Static task
static1
Behavioral task
behavioral1
Sample
697a6472ed5f06d54b42064e5e6850f9_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
697a6472ed5f06d54b42064e5e6850f9_JaffaCakes118.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral3
Sample
697a6472ed5f06d54b42064e5e6850f9_JaffaCakes118.apk
Resource
android-x64-arm64-20240514-en
Malware Config
Targets
-
-
Target
697a6472ed5f06d54b42064e5e6850f9_JaffaCakes118
-
Size
2.3MB
-
MD5
697a6472ed5f06d54b42064e5e6850f9
-
SHA1
20a9f3b505707157cf6c4408c6c66de0c2b47e09
-
SHA256
db0a1bc3fd2329470b9ba4df85badecd3cba7b5ac997f3c04e7f4a1dc1faaf73
-
SHA512
7c7a3a32f4af5a23bc94479e9ab76caaca2bfd899cd973f4cfef90a61855c23c96f50594b88e1002e787eb0c94f0411abd6ffdab00bf72cf8dfd921540d11355
-
SSDEEP
49152:tzZSmIi856LJMe39AsDzX90b6AIoBN5/NNyf:vvIiDyP2z9dLoBN5yf
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-