General
-
Target
6a9b32447b74abb2b5eb1a1683d82ac0_JaffaCakes118
-
Size
21.0MB
-
Sample
240523-l8w3gscg93
-
MD5
6a9b32447b74abb2b5eb1a1683d82ac0
-
SHA1
104bc31d86c62bd26078b862091c43e63c6f8c93
-
SHA256
e7ff1300451a2fa0bd106fcfe48cc69c63f9a0fa95dff61639f4fffeab1efa7a
-
SHA512
46e07f889bf4bc3ac6b502558af1920dbcf62656af899d69c64d9f00686e27497659662a75daa3204fb984af846274b3bfa13da25808d229143c241a311e0d08
-
SSDEEP
393216:qPzs/o+KtxrgnppC4TZlctu+oqNhZFy9irf0qsdXxF61:qPEqUPRZlctu+oyFbrf0PdXxW
Static task
static1
Behavioral task
behavioral1
Sample
6a9b32447b74abb2b5eb1a1683d82ac0_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
6a9b32447b74abb2b5eb1a1683d82ac0_JaffaCakes118.apk
Resource
android-x64-arm64-20240514-en
Malware Config
Targets
-
-
Target
6a9b32447b74abb2b5eb1a1683d82ac0_JaffaCakes118
-
Size
21.0MB
-
MD5
6a9b32447b74abb2b5eb1a1683d82ac0
-
SHA1
104bc31d86c62bd26078b862091c43e63c6f8c93
-
SHA256
e7ff1300451a2fa0bd106fcfe48cc69c63f9a0fa95dff61639f4fffeab1efa7a
-
SHA512
46e07f889bf4bc3ac6b502558af1920dbcf62656af899d69c64d9f00686e27497659662a75daa3204fb984af846274b3bfa13da25808d229143c241a311e0d08
-
SSDEEP
393216:qPzs/o+KtxrgnppC4TZlctu+oqNhZFy9irf0qsdXxF61:qPEqUPRZlctu+oyFbrf0PdXxW
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-