General
-
Target
80d49aa4ab154554a5d8894b89204348_JaffaCakes118
-
Size
2.0MB
-
Sample
240529-qaw22sfc3w
-
MD5
80d49aa4ab154554a5d8894b89204348
-
SHA1
1b0fa3601f7e9c02bbdd17dadc26100121e58486
-
SHA256
d63409fca12a344f0664eaa99bc737f4f9b522188e146d92de6131149160fb91
-
SHA512
0ee999003b53765297361544804a9d1f491530e0a90c8e8f5958d91143e728fb5044b38b65913e8599ab9f244b368a591b857ad154f4443af893b89b965a745c
-
SSDEEP
49152:a1Etudr9YKRlPy0vNxmF6Ea7P7qMfKQY5bfKg73ZdA:GE8jP9fvnpEaP71zabfK7
Static task
static1
Behavioral task
behavioral1
Sample
80d49aa4ab154554a5d8894b89204348_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
80d49aa4ab154554a5d8894b89204348_JaffaCakes118.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral3
Sample
80d49aa4ab154554a5d8894b89204348_JaffaCakes118.apk
Resource
android-x64-arm64-20240514-en
Malware Config
Targets
-
-
Target
80d49aa4ab154554a5d8894b89204348_JaffaCakes118
-
Size
2.0MB
-
MD5
80d49aa4ab154554a5d8894b89204348
-
SHA1
1b0fa3601f7e9c02bbdd17dadc26100121e58486
-
SHA256
d63409fca12a344f0664eaa99bc737f4f9b522188e146d92de6131149160fb91
-
SHA512
0ee999003b53765297361544804a9d1f491530e0a90c8e8f5958d91143e728fb5044b38b65913e8599ab9f244b368a591b857ad154f4443af893b89b965a745c
-
SSDEEP
49152:a1Etudr9YKRlPy0vNxmF6Ea7P7qMfKQY5bfKg73ZdA:GE8jP9fvnpEaP71zabfK7
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Schedules tasks to execute at a specified time
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
-