General
-
Target
8c198da946d100845af5048b93ffd8c7_JaffaCakes118
-
Size
2.6MB
-
Sample
240601-23mjvsaf99
-
MD5
8c198da946d100845af5048b93ffd8c7
-
SHA1
b5e46f6b5254593b88c8e3aa7c18e4103fb5d142
-
SHA256
bf275fce9965c4decbd5070058025f0e4c500f1a6e7cdbc8776f82c55f2b61c1
-
SHA512
9d49c152dc719a89057b574837e593a052a318288d5d207ceddcade6847ff038667b10ed3f6f72f9fb3625cd31f8d2b9763f34431f8f3f69cd23da0136f9473d
-
SSDEEP
49152:DNwvy7Ev05t+Sf0GEDaTaYtr5RERV0RRon7x/n3OyaySLBtJUzzrNO:DNwvyov05t7MGxTaYPRvnon7x/n3t0Lb
Static task
static1
Behavioral task
behavioral1
Sample
8c198da946d100845af5048b93ffd8c7_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
8c198da946d100845af5048b93ffd8c7_JaffaCakes118.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral3
Sample
8c198da946d100845af5048b93ffd8c7_JaffaCakes118.apk
Resource
android-x64-arm64-20240514-en
Malware Config
Targets
-
-
Target
8c198da946d100845af5048b93ffd8c7_JaffaCakes118
-
Size
2.6MB
-
MD5
8c198da946d100845af5048b93ffd8c7
-
SHA1
b5e46f6b5254593b88c8e3aa7c18e4103fb5d142
-
SHA256
bf275fce9965c4decbd5070058025f0e4c500f1a6e7cdbc8776f82c55f2b61c1
-
SHA512
9d49c152dc719a89057b574837e593a052a318288d5d207ceddcade6847ff038667b10ed3f6f72f9fb3625cd31f8d2b9763f34431f8f3f69cd23da0136f9473d
-
SSDEEP
49152:DNwvy7Ev05t+Sf0GEDaTaYtr5RERV0RRon7x/n3OyaySLBtJUzzrNO:DNwvyov05t7MGxTaYPRvnon7x/n3t0Lb
-
Checks if the Android device is rooted.
-
Checks Android system properties for emulator presence.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-