General
-
Target
6ced0f2f4b81c1cced1e09019740dd04_JaffaCakes118
-
Size
29.9MB
-
Sample
240524-bxgtbage99
-
MD5
6ced0f2f4b81c1cced1e09019740dd04
-
SHA1
589365b6d03f50e77e21fff18ca6fa58fdce13e8
-
SHA256
2c3be1db019077e19d3de552e00eb31c8e87dafe3b45dea59e5bf90220403cf8
-
SHA512
42a86a1a41f96ee1b21fb47f706ccdb40e5c6f9d3215dfb1e55679f172c187c29d3f635383a46b2fec817969352cba5a3f80753edabb4708b23c2c6ee6ace96b
-
SSDEEP
786432:PdyDnDAvW52MPrOn7nyDNLJD4NQr3tS2H0Zz:P8jDAvWbrOn7n+NlD4NQzf2z
Static task
static1
Behavioral task
behavioral1
Sample
6ced0f2f4b81c1cced1e09019740dd04_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
6ced0f2f4b81c1cced1e09019740dd04_JaffaCakes118.apk
Resource
android-x64-20240514-en
Malware Config
Targets
-
-
Target
6ced0f2f4b81c1cced1e09019740dd04_JaffaCakes118
-
Size
29.9MB
-
MD5
6ced0f2f4b81c1cced1e09019740dd04
-
SHA1
589365b6d03f50e77e21fff18ca6fa58fdce13e8
-
SHA256
2c3be1db019077e19d3de552e00eb31c8e87dafe3b45dea59e5bf90220403cf8
-
SHA512
42a86a1a41f96ee1b21fb47f706ccdb40e5c6f9d3215dfb1e55679f172c187c29d3f635383a46b2fec817969352cba5a3f80753edabb4708b23c2c6ee6ace96b
-
SSDEEP
786432:PdyDnDAvW52MPrOn7nyDNLJD4NQr3tS2H0Zz:P8jDAvWbrOn7n+NlD4NQzf2z
-
Checks if the Android device is rooted.
-
Checks Qemu related system properties.
Checks for Android system properties related to Qemu for Emulator detection.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Reads information about phone network operator.
-