General
-
Target
84d248d942479bdac1bef975d8a9d058_JaffaCakes118
-
Size
13.6MB
-
Sample
240530-vb7x6afe73
-
MD5
84d248d942479bdac1bef975d8a9d058
-
SHA1
55faa8c217b1d9da06f91e3eaf99508c18472922
-
SHA256
b800439518436319a427a4d6b4611afe8bdc8845e7c8ab492897ac5c82bd2839
-
SHA512
d47b259c57de01684527fd40a292e0b962629059cc17ac4fca4356aafa8473e2867b4128053a9918ac6f41a1c2d7e3d804706c20427a8b83d614a3b17536b8fe
-
SSDEEP
393216:BCzRHgXbaIWe9KWOSVEp7f2bK035w+k7wrNZUX2bcV:BCdAXbaIrG4EpT2uz+kMrNZC2gV
Static task
static1
Behavioral task
behavioral1
Sample
84d248d942479bdac1bef975d8a9d058_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
84d248d942479bdac1bef975d8a9d058_JaffaCakes118.apk
Resource
android-x64-20240514-en
Malware Config
Targets
-
-
Target
84d248d942479bdac1bef975d8a9d058_JaffaCakes118
-
Size
13.6MB
-
MD5
84d248d942479bdac1bef975d8a9d058
-
SHA1
55faa8c217b1d9da06f91e3eaf99508c18472922
-
SHA256
b800439518436319a427a4d6b4611afe8bdc8845e7c8ab492897ac5c82bd2839
-
SHA512
d47b259c57de01684527fd40a292e0b962629059cc17ac4fca4356aafa8473e2867b4128053a9918ac6f41a1c2d7e3d804706c20427a8b83d614a3b17536b8fe
-
SSDEEP
393216:BCzRHgXbaIWe9KWOSVEp7f2bK035w+k7wrNZUX2bcV:BCdAXbaIrG4EpT2uz+kMrNZC2gV
-
Checks if the Android device is rooted.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-