General
-
Target
7f5c736dce85f2052e181943ff3065ce_JaffaCakes118
-
Size
22.7MB
-
Sample
240529-d3qdrahg84
-
MD5
7f5c736dce85f2052e181943ff3065ce
-
SHA1
89af8646c0c1773156b40949339b2dffa228e262
-
SHA256
15b333329a22fa4fefb55fa8d0c6fb5d2ad79f625c5b1b19cf195b3d8d1efcbd
-
SHA512
34725895989a78d5a895d2b95d5104751a16706309964b7d894398b4a6de8d87833a50855330389176b7809c723f179eb74e90674ec68ad953b530ae90e04cfc
-
SSDEEP
393216:uctNozaDIQqDKoNXuRjI2fZLdylAjREmnVhc6Iz6rGvbNNJLiRVD:hI/XuRk0MSvf/
Static task
static1
Behavioral task
behavioral1
Sample
7f5c736dce85f2052e181943ff3065ce_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
7f5c736dce85f2052e181943ff3065ce_JaffaCakes118.apk
Resource
android-x64-20240514-en
Malware Config
Targets
-
-
Target
7f5c736dce85f2052e181943ff3065ce_JaffaCakes118
-
Size
22.7MB
-
MD5
7f5c736dce85f2052e181943ff3065ce
-
SHA1
89af8646c0c1773156b40949339b2dffa228e262
-
SHA256
15b333329a22fa4fefb55fa8d0c6fb5d2ad79f625c5b1b19cf195b3d8d1efcbd
-
SHA512
34725895989a78d5a895d2b95d5104751a16706309964b7d894398b4a6de8d87833a50855330389176b7809c723f179eb74e90674ec68ad953b530ae90e04cfc
-
SSDEEP
393216:uctNozaDIQqDKoNXuRjI2fZLdylAjREmnVhc6Iz6rGvbNNJLiRVD:hI/XuRk0MSvf/
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-