General
-
Target
6c382b1afcefa0a6fe12926cbd014958_JaffaCakes118
-
Size
1.9MB
-
Sample
240523-znrtxsga2x
-
MD5
6c382b1afcefa0a6fe12926cbd014958
-
SHA1
a289cb96ad2320f2448334b4fa72466046bb95ab
-
SHA256
1a0ec944618778ddafaaa291b364106b8c36ff76a1818b918219d8046ae30e9d
-
SHA512
0e100dd6a19fc266fcd8bdac7532343fb6f9bf576c98f3a15dbc12b4d53c130d7a9f986218359fd8deef204d19dfdcc8693cd768ae34046522ca10842da54ebd
-
SSDEEP
49152:Fu283rlE6u7oYr0FfjzGAwb6c/X1E0QnwQw/wb73ZUA:Fu28ju7oY4FXGdb6ca1nb6G
Static task
static1
Behavioral task
behavioral1
Sample
6c382b1afcefa0a6fe12926cbd014958_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
6c382b1afcefa0a6fe12926cbd014958_JaffaCakes118.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral3
Sample
6c382b1afcefa0a6fe12926cbd014958_JaffaCakes118.apk
Resource
android-x64-arm64-20240514-en
Malware Config
Targets
-
-
Target
6c382b1afcefa0a6fe12926cbd014958_JaffaCakes118
-
Size
1.9MB
-
MD5
6c382b1afcefa0a6fe12926cbd014958
-
SHA1
a289cb96ad2320f2448334b4fa72466046bb95ab
-
SHA256
1a0ec944618778ddafaaa291b364106b8c36ff76a1818b918219d8046ae30e9d
-
SHA512
0e100dd6a19fc266fcd8bdac7532343fb6f9bf576c98f3a15dbc12b4d53c130d7a9f986218359fd8deef204d19dfdcc8693cd768ae34046522ca10842da54ebd
-
SSDEEP
49152:Fu283rlE6u7oYr0FfjzGAwb6c/X1E0QnwQw/wb73ZUA:Fu28ju7oY4FXGdb6ca1nb6G
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Schedules tasks to execute at a specified time
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
-