General
-
Target
8fd97212efa068b87cb5909745697f0c_JaffaCakes118
-
Size
2.6MB
-
Sample
240602-3rgd5scf63
-
MD5
8fd97212efa068b87cb5909745697f0c
-
SHA1
50a8967c6eef5a1e417c71c559f088614a51a80b
-
SHA256
5a4db95b24b8dce75dbfee7324f973cb47ccb71a4b996b8da863e775afbde3f4
-
SHA512
daa8ecba61316735296bd1cc8e0958a2c34e7a0b7fdee6ae08deb74c5758b6e7dc6972d1ec1ff80eb2ab253cce64baeb9b7f86cb3001049da1d6f2e3a1f7ddec
-
SSDEEP
49152:9oF3wbdakjuH2tseozet8Uxtw4Mb/hz209+BB7vqTaP1KqGoQugTN94:9s3+dRbvC/rs0wBRvPvGfVT34
Static task
static1
Behavioral task
behavioral1
Sample
8fd97212efa068b87cb5909745697f0c_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
8fd97212efa068b87cb5909745697f0c_JaffaCakes118.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral3
Sample
8fd97212efa068b87cb5909745697f0c_JaffaCakes118.apk
Resource
android-x64-arm64-20240514-en
Malware Config
Targets
-
-
Target
8fd97212efa068b87cb5909745697f0c_JaffaCakes118
-
Size
2.6MB
-
MD5
8fd97212efa068b87cb5909745697f0c
-
SHA1
50a8967c6eef5a1e417c71c559f088614a51a80b
-
SHA256
5a4db95b24b8dce75dbfee7324f973cb47ccb71a4b996b8da863e775afbde3f4
-
SHA512
daa8ecba61316735296bd1cc8e0958a2c34e7a0b7fdee6ae08deb74c5758b6e7dc6972d1ec1ff80eb2ab253cce64baeb9b7f86cb3001049da1d6f2e3a1f7ddec
-
SSDEEP
49152:9oF3wbdakjuH2tseozet8Uxtw4Mb/hz209+BB7vqTaP1KqGoQugTN94:9s3+dRbvC/rs0wBRvPvGfVT34
-
Checks if the Android device is rooted.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Acquires the wake lock
-