General
-
Target
79a76edb82bc0d6f4d66e34f56e4022b_JaffaCakes118
-
Size
4.4MB
-
Sample
240527-tctlgsaf57
-
MD5
79a76edb82bc0d6f4d66e34f56e4022b
-
SHA1
87e29564f1b08b451c8f5b0ca6e51f3c3caae402
-
SHA256
b5ee5dd9f0cb2828251c387bf1c1f333da706b66b53972ca9b140259bd4219e9
-
SHA512
0f020a323f4da67652423257a28437a4ee18024d0169d77ff0673822aec86af8680de3fba345452650d6dbfe05d8342915c93f74bb1d25c966aad741af299ebe
-
SSDEEP
98304:VL3poecuT4tkt/Ps+2dyacf5m2/wYomLN7q2pYs:VL3poecu0tkt/Pd25cf42/wYomJm2pYs
Static task
static1
Behavioral task
behavioral1
Sample
79a76edb82bc0d6f4d66e34f56e4022b_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
79a76edb82bc0d6f4d66e34f56e4022b_JaffaCakes118.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral3
Sample
79a76edb82bc0d6f4d66e34f56e4022b_JaffaCakes118.apk
Resource
android-x64-arm64-20240514-en
Malware Config
Targets
-
-
Target
79a76edb82bc0d6f4d66e34f56e4022b_JaffaCakes118
-
Size
4.4MB
-
MD5
79a76edb82bc0d6f4d66e34f56e4022b
-
SHA1
87e29564f1b08b451c8f5b0ca6e51f3c3caae402
-
SHA256
b5ee5dd9f0cb2828251c387bf1c1f333da706b66b53972ca9b140259bd4219e9
-
SHA512
0f020a323f4da67652423257a28437a4ee18024d0169d77ff0673822aec86af8680de3fba345452650d6dbfe05d8342915c93f74bb1d25c966aad741af299ebe
-
SSDEEP
98304:VL3poecuT4tkt/Ps+2dyacf5m2/wYomLN7q2pYs:VL3poecu0tkt/Pd25cf42/wYomJm2pYs
-
Checks if the Android device is rooted.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-