General
-
Target
820f46eca72897a7738b3b5c2526063d_JaffaCakes118
-
Size
1.9MB
-
Sample
240529-1rbgsabh87
-
MD5
820f46eca72897a7738b3b5c2526063d
-
SHA1
f3b87b5fc4837ec752357f6536639f91c7400840
-
SHA256
51c3fed39510f9b0af862b8552294ceae6aeed6fc879cca6b53379e099d58301
-
SHA512
9900dfe6793e73756ad864409fbc478529c17df00caa5f57eac01719a823d1195730790d70b46584a03f4f3ed2f1b829e2be9be2f40a5bb1d964ad3471df609e
-
SSDEEP
49152:4qNGWEGPFJT6sdThCO2JK1H0jw878KQm73ZGj:4qo+9JjdlCOmn78zJ
Static task
static1
Behavioral task
behavioral1
Sample
820f46eca72897a7738b3b5c2526063d_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
820f46eca72897a7738b3b5c2526063d_JaffaCakes118.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral3
Sample
820f46eca72897a7738b3b5c2526063d_JaffaCakes118.apk
Resource
android-x64-arm64-20240514-en
Malware Config
Targets
-
-
Target
820f46eca72897a7738b3b5c2526063d_JaffaCakes118
-
Size
1.9MB
-
MD5
820f46eca72897a7738b3b5c2526063d
-
SHA1
f3b87b5fc4837ec752357f6536639f91c7400840
-
SHA256
51c3fed39510f9b0af862b8552294ceae6aeed6fc879cca6b53379e099d58301
-
SHA512
9900dfe6793e73756ad864409fbc478529c17df00caa5f57eac01719a823d1195730790d70b46584a03f4f3ed2f1b829e2be9be2f40a5bb1d964ad3471df609e
-
SSDEEP
49152:4qNGWEGPFJT6sdThCO2JK1H0jw878KQm73ZGj:4qo+9JjdlCOmn78zJ
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Schedules tasks to execute at a specified time
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
-