General
-
Target
6b5b879e6029fd20d7a01bea3efc1313_JaffaCakes118
-
Size
1.9MB
-
Sample
240523-snbdlsfe57
-
MD5
6b5b879e6029fd20d7a01bea3efc1313
-
SHA1
99dd9c3c0af157a0565a0f516552d1999a3bf092
-
SHA256
ca6c6007727514ac10ddd61d5d9b85854b17026dd5eb89cc15a69dc2e93cf0b4
-
SHA512
1713355cae8107c1de03e9e484c018c00db8ee05058d7822a8dbfb864e79df7041d865978cc3a834eddbe847ab5fee587456cf02f08a799dc4326ce768cb2745
-
SSDEEP
49152:AOonvjLZ2CYTGnUKhOd2xMSA0Vuld7ydbfQ0QR2S73ZGB:AOonoClPoqW7kb41Ql
Static task
static1
Behavioral task
behavioral1
Sample
6b5b879e6029fd20d7a01bea3efc1313_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
6b5b879e6029fd20d7a01bea3efc1313_JaffaCakes118.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral3
Sample
6b5b879e6029fd20d7a01bea3efc1313_JaffaCakes118.apk
Resource
android-x64-arm64-20240514-en
Malware Config
Targets
-
-
Target
6b5b879e6029fd20d7a01bea3efc1313_JaffaCakes118
-
Size
1.9MB
-
MD5
6b5b879e6029fd20d7a01bea3efc1313
-
SHA1
99dd9c3c0af157a0565a0f516552d1999a3bf092
-
SHA256
ca6c6007727514ac10ddd61d5d9b85854b17026dd5eb89cc15a69dc2e93cf0b4
-
SHA512
1713355cae8107c1de03e9e484c018c00db8ee05058d7822a8dbfb864e79df7041d865978cc3a834eddbe847ab5fee587456cf02f08a799dc4326ce768cb2745
-
SSDEEP
49152:AOonvjLZ2CYTGnUKhOd2xMSA0Vuld7ydbfQ0QR2S73ZGB:AOonoClPoqW7kb41Ql
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Schedules tasks to execute at a specified time
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
-