General
-
Target
8cdceb2f52f7e6794bf24b311341e5f8_JaffaCakes118
-
Size
4.4MB
-
Sample
240602-etp73abb86
-
MD5
8cdceb2f52f7e6794bf24b311341e5f8
-
SHA1
1703013efd05b9967e2f32c4a8e9796938fc1225
-
SHA256
154914e17e367accee62b62fbdd7149e5e67057ac83668b547602d6130df9635
-
SHA512
a5d6a8c5debfade04dca67dbddd5926eb07687e7900aba5c41326cc82de1d8ae5c39b4b285f7bda20a5cfb2b98a29ad67deff46e1c79810b47d80841a84bd8cb
-
SSDEEP
98304:uL3phCOo89B765oTiE5K4VO3ddJz6RQvlt9Stwsg:uL3phCOoCB765SiE44VO3hzPvlDStwsg
Static task
static1
Behavioral task
behavioral1
Sample
8cdceb2f52f7e6794bf24b311341e5f8_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
8cdceb2f52f7e6794bf24b311341e5f8_JaffaCakes118.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral3
Sample
8cdceb2f52f7e6794bf24b311341e5f8_JaffaCakes118.apk
Resource
android-x64-arm64-20240514-en
Malware Config
Targets
-
-
Target
8cdceb2f52f7e6794bf24b311341e5f8_JaffaCakes118
-
Size
4.4MB
-
MD5
8cdceb2f52f7e6794bf24b311341e5f8
-
SHA1
1703013efd05b9967e2f32c4a8e9796938fc1225
-
SHA256
154914e17e367accee62b62fbdd7149e5e67057ac83668b547602d6130df9635
-
SHA512
a5d6a8c5debfade04dca67dbddd5926eb07687e7900aba5c41326cc82de1d8ae5c39b4b285f7bda20a5cfb2b98a29ad67deff46e1c79810b47d80841a84bd8cb
-
SSDEEP
98304:uL3phCOo89B765oTiE5K4VO3ddJz6RQvlt9Stwsg:uL3phCOoCB765SiE44VO3hzPvlDStwsg
-
Checks if the Android device is rooted.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-