General
-
Target
6b405cd489ffcb78070c455b26334438_JaffaCakes118
-
Size
7.2MB
-
Sample
240523-rwdy2aee47
-
MD5
6b405cd489ffcb78070c455b26334438
-
SHA1
81d971b504c8a8967cc43b051051dee6841bc8a4
-
SHA256
8b754349ebfe4ad0a2bfe4759ca4657f2dae971cd8d6a48310ee62dc8b35cacb
-
SHA512
1d4666a570ea7e54044a0b60e91062eaf634bc565068822591f92fb59e8d741b1fa509892fb9f960827dc468c9c38d3aa031ee68b61766bc588d6bd5dcc8362f
-
SSDEEP
98304:T7GhxAXSiM7Pkfk+11Ag6K57enp/cJRlsrEZWbrVJ:T7G7DiM7gV+g/57adUR+rq8L
Static task
static1
Behavioral task
behavioral1
Sample
6b405cd489ffcb78070c455b26334438_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
6b405cd489ffcb78070c455b26334438_JaffaCakes118.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral3
Sample
6b405cd489ffcb78070c455b26334438_JaffaCakes118.apk
Resource
android-x64-arm64-20240514-en
Malware Config
Targets
-
-
Target
6b405cd489ffcb78070c455b26334438_JaffaCakes118
-
Size
7.2MB
-
MD5
6b405cd489ffcb78070c455b26334438
-
SHA1
81d971b504c8a8967cc43b051051dee6841bc8a4
-
SHA256
8b754349ebfe4ad0a2bfe4759ca4657f2dae971cd8d6a48310ee62dc8b35cacb
-
SHA512
1d4666a570ea7e54044a0b60e91062eaf634bc565068822591f92fb59e8d741b1fa509892fb9f960827dc468c9c38d3aa031ee68b61766bc588d6bd5dcc8362f
-
SSDEEP
98304:T7GhxAXSiM7Pkfk+11Ag6K57enp/cJRlsrEZWbrVJ:T7G7DiM7gV+g/57adUR+rq8L
-
Checks if the Android device is rooted.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-
Checks the presence of a debugger
-