General
-
Target
6f8d4b4eb4b96e21146dc24a754181f0_JaffaCakes118
-
Size
6.0MB
-
Sample
240524-xx69vsga2w
-
MD5
6f8d4b4eb4b96e21146dc24a754181f0
-
SHA1
c62141542da9ddcced17704bd465b2e5791dfea3
-
SHA256
c5afb68c2b11d77c103208e2b63b84cbe9727cb0c039925ef1136824bdb05659
-
SHA512
f3baa905ddfa4673a52685829492c8f9d58dfd53a440ba7e8ecd55aca1cc95e80c21d1ea3fbbf2c9a14356c5935e95bd21e57d56a2381a17484f40587ae036fd
-
SSDEEP
98304:SmZcJlkTp9dUNgBQp4hxZYTLKaQJdD8PFDT6nZoT7h9FZPrGyu7NVlwwpy:dmvknagBLhxZY3Ka5KZefZP6yuJVeT
Static task
static1
Behavioral task
behavioral1
Sample
6f8d4b4eb4b96e21146dc24a754181f0_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
6f8d4b4eb4b96e21146dc24a754181f0_JaffaCakes118.apk
Resource
android-33-x64-arm64-20240514-en
Malware Config
Targets
-
-
Target
6f8d4b4eb4b96e21146dc24a754181f0_JaffaCakes118
-
Size
6.0MB
-
MD5
6f8d4b4eb4b96e21146dc24a754181f0
-
SHA1
c62141542da9ddcced17704bd465b2e5791dfea3
-
SHA256
c5afb68c2b11d77c103208e2b63b84cbe9727cb0c039925ef1136824bdb05659
-
SHA512
f3baa905ddfa4673a52685829492c8f9d58dfd53a440ba7e8ecd55aca1cc95e80c21d1ea3fbbf2c9a14356c5935e95bd21e57d56a2381a17484f40587ae036fd
-
SSDEEP
98304:SmZcJlkTp9dUNgBQp4hxZYTLKaQJdD8PFDT6nZoT7h9FZPrGyu7NVlwwpy:dmvknagBLhxZY3Ka5KZefZP6yuJVeT
-
Checks if the Android device is rooted.
-
Checks known Qemu files.
Checks for known Qemu files that exist on Android virtual device images.
-
Checks known Qemu pipes.
Checks for known pipes used by the Android emulator to communicate with the host.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-