General
-
Target
7ff43958165e7480e6bafc2f46ff3991_JaffaCakes118
-
Size
1.9MB
-
Sample
240529-jesf4afh98
-
MD5
7ff43958165e7480e6bafc2f46ff3991
-
SHA1
c0c917acd604d2541dee447ff9bd1701e10c05b1
-
SHA256
a2cf49470ba61389d381beff0547022e86e99c247fa5915e9e379d2ae0c35e98
-
SHA512
3c16c47271655efda57f3224e93f8fa126ae65a1353f915f80953ab6148e953f898eccfd3b62da8cd31c5430e9f47b82e84db826bcaf94a80bbf43f81b187099
-
SSDEEP
49152:JDSfu8uDQxeHPxmqJ730nCg21l50Q0EfEkEe73Zoy:RSfFLxeHPIqSnbs51j
Static task
static1
Behavioral task
behavioral1
Sample
7ff43958165e7480e6bafc2f46ff3991_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
7ff43958165e7480e6bafc2f46ff3991_JaffaCakes118.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral3
Sample
7ff43958165e7480e6bafc2f46ff3991_JaffaCakes118.apk
Resource
android-x64-arm64-20240514-en
Malware Config
Targets
-
-
Target
7ff43958165e7480e6bafc2f46ff3991_JaffaCakes118
-
Size
1.9MB
-
MD5
7ff43958165e7480e6bafc2f46ff3991
-
SHA1
c0c917acd604d2541dee447ff9bd1701e10c05b1
-
SHA256
a2cf49470ba61389d381beff0547022e86e99c247fa5915e9e379d2ae0c35e98
-
SHA512
3c16c47271655efda57f3224e93f8fa126ae65a1353f915f80953ab6148e953f898eccfd3b62da8cd31c5430e9f47b82e84db826bcaf94a80bbf43f81b187099
-
SSDEEP
49152:JDSfu8uDQxeHPxmqJ730nCg21l50Q0EfEkEe73Zoy:RSfFLxeHPIqSnbs51j
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Schedules tasks to execute at a specified time
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
-