General
-
Target
6d0a365fa5822d00ac52aac793dff111_JaffaCakes118
-
Size
8.4MB
-
Sample
240524-cqdczshg31
-
MD5
6d0a365fa5822d00ac52aac793dff111
-
SHA1
d8c7d060dccd6a4d11c7b1afa2a998ee6ba4c77e
-
SHA256
3e9e5e4eefb712fa9f8eccc89123b1232c696c7d43bbbfbe37e262429eaff39b
-
SHA512
d58a78457e6b77b74cb8587e024d4212d2d45224058cd6ad9561536075f58b2857948d5c9b3ed3f1ac03a1c475d56b8de29301e2608d53e8c6af990a055f2b85
-
SSDEEP
196608:38siY+jl9G6odpg7c9KshRdJngbZlpHDOKb2IcX661f7VXo9wH:38siY+jtodK7cThjxKZOKx6zXomH
Static task
static1
Behavioral task
behavioral1
Sample
6d0a365fa5822d00ac52aac793dff111_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
6d0a365fa5822d00ac52aac793dff111_JaffaCakes118.apk
Resource
android-x64-arm64-20240514-en
Malware Config
Targets
-
-
Target
6d0a365fa5822d00ac52aac793dff111_JaffaCakes118
-
Size
8.4MB
-
MD5
6d0a365fa5822d00ac52aac793dff111
-
SHA1
d8c7d060dccd6a4d11c7b1afa2a998ee6ba4c77e
-
SHA256
3e9e5e4eefb712fa9f8eccc89123b1232c696c7d43bbbfbe37e262429eaff39b
-
SHA512
d58a78457e6b77b74cb8587e024d4212d2d45224058cd6ad9561536075f58b2857948d5c9b3ed3f1ac03a1c475d56b8de29301e2608d53e8c6af990a055f2b85
-
SSDEEP
196608:38siY+jl9G6odpg7c9KshRdJngbZlpHDOKb2IcX661f7VXo9wH:38siY+jtodK7cThjxKZOKx6zXomH
-
Checks if the Android device is rooted.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-