General
-
Target
6e1fdfbdab69090fea77b3f2f33098a8_JaffaCakes118
-
Size
2.9MB
-
Sample
240524-lzweladc25
-
MD5
6e1fdfbdab69090fea77b3f2f33098a8
-
SHA1
2807c3065e946b82b8f2645f1733530e29535b6c
-
SHA256
dc18a22cf292932da1bf990710a5ddf80701208c2d42544b622a23d1c01c1bcb
-
SHA512
6a48337c55cebc98752ac4f6c8e1c09ee0a5c92eac21cd41281bf5409e4c895c9e97c6e25dec76bd6766639abed574cb289f4987e6cbd2d7a58f051396f688bc
-
SSDEEP
49152:Ci7Ig3sBYZS43P5wyxd4FWM4MuT4CVGFI4vTwNgL16zP2yknMy7TI:97r3sBeS43P5wWKo4CVGNvT9YmTI
Static task
static1
Behavioral task
behavioral1
Sample
6e1fdfbdab69090fea77b3f2f33098a8_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
6e1fdfbdab69090fea77b3f2f33098a8_JaffaCakes118.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral3
Sample
6e1fdfbdab69090fea77b3f2f33098a8_JaffaCakes118.apk
Resource
android-x64-arm64-20240514-en
Malware Config
Targets
-
-
Target
6e1fdfbdab69090fea77b3f2f33098a8_JaffaCakes118
-
Size
2.9MB
-
MD5
6e1fdfbdab69090fea77b3f2f33098a8
-
SHA1
2807c3065e946b82b8f2645f1733530e29535b6c
-
SHA256
dc18a22cf292932da1bf990710a5ddf80701208c2d42544b622a23d1c01c1bcb
-
SHA512
6a48337c55cebc98752ac4f6c8e1c09ee0a5c92eac21cd41281bf5409e4c895c9e97c6e25dec76bd6766639abed574cb289f4987e6cbd2d7a58f051396f688bc
-
SSDEEP
49152:Ci7Ig3sBYZS43P5wyxd4FWM4MuT4CVGFI4vTwNgL16zP2yknMy7TI:97r3sBeS43P5wWKo4CVGNvT9YmTI
-
Checks if the Android device is rooted.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-